bouj33boy / Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024Links
Resources Links for the Research Based on Josh Prager and Nico Shyne's
☆13Updated last year
Alternatives and similar repositories for Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024
Users that are interested in Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024 are comparing it to the libraries listed below
Sorting:
- An Ansible collection that installs an ADFS deployment with optional configurations.☆43Updated 3 weeks ago
- A small go tool to upload JSON files to the BloodHound community edition API☆30Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆50Updated 6 months ago
- AAD related enumeration in Nim☆132Updated 2 years ago
- ☆36Updated 2 years ago
- ☆34Updated 5 months ago
- Abuse Azure API permissions for red teaming☆70Updated 2 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Updated 11 months ago
- A python library to create BloodHound OpenGraphs☆43Updated last month
- ☆88Updated 3 years ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆130Updated 4 months ago
- ☆115Updated 7 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Updated 2 months ago
- Microsoft Graph API post-exploitation toolkit☆95Updated last year
- ☆50Updated 9 months ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆65Updated 11 months ago
- Fun GUI for Group3rs output log☆37Updated 2 years ago
- An Ansible collection that installs an SCCM deployment with optional configurations.☆97Updated last month
- 🌩️ Collection of BloodHound queries for Azure☆82Updated last year
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆93Updated 2 months ago
- ☆47Updated last year
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆94Updated 2 years ago
- ☆44Updated 11 months ago
- BloodHound PowerShell client☆75Updated last month
- SCEP request tool for AD CS and Intune☆73Updated 2 months ago
- Living off the land searches for explorer and sharepoint☆92Updated last month
- ☆28Updated last month
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆66Updated 10 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Updated 2 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Updated 9 months ago