bouj33boy / Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024
Resources Links for the Research Based on Josh Prager and Nico Shyne's
☆13Updated 5 months ago
Alternatives and similar repositories for Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024:
Users that are interested in Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024 are comparing it to the libraries listed below
- Scripts to enumerate and report on Entra Conditional Access☆27Updated 6 months ago
- A small go tool to upload JSON files to the BloodHound community edition API☆30Updated 9 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆27Updated 3 months ago
- ☆36Updated last year
- Fun GUI for Group3rs output log☆37Updated last year
- Microsoft Graph API post-exploitation toolkit☆94Updated 8 months ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆55Updated last month
- ☆87Updated 2 years ago
- ☆43Updated 8 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- ☆71Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆60Updated 2 months ago
- A C# project that builds a Web Applciation which redirects all HTTPS☆24Updated last month
- Living off the land searches for explorer and sharepoint☆57Updated 4 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆37Updated last month
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆23Updated 2 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆35Updated last month
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆38Updated last month
- Two in one, patch lifetime powershell console, no more etw and amsi!☆84Updated 8 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 3 months ago
- Scripts to interact with Microsoft Graph APIs☆36Updated 4 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 6 months ago
- ☆85Updated last week
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- ☆76Updated 11 months ago
- ☆13Updated last year
- Abuse Azure API permissions for red teaming☆61Updated 2 years ago
- Your Skyfall Infrastructure Pack☆64Updated last week
- ☆65Updated last year