bouj33boy / Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024Links
Resources Links for the Research Based on Josh Prager and Nico Shyne's
☆13Updated 10 months ago
Alternatives and similar repositories for Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024
Users that are interested in Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024 are comparing it to the libraries listed below
Sorting:
- An Ansible collection that installs an ADFS deployment with optional configurations.☆42Updated 8 months ago
- A small go tool to upload JSON files to the BloodHound community edition API☆30Updated last year
- AAD related enumeration in Nim☆131Updated 2 years ago
- ☆107Updated 3 months ago
- ☆37Updated last year
- BloodHound PowerShell client☆66Updated last month
- Microsoft Graph API post-exploitation toolkit☆94Updated last year
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆39Updated last week
- Fun GUI for Group3rs output log☆37Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆75Updated 8 months ago
- ☆89Updated 3 years ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆55Updated 6 months ago
- ☆103Updated 2 years ago
- An Ansible collection that installs an SCCM deployment with optional configurations.☆89Updated 2 months ago
- Abuse Azure API permissions for red teaming☆68Updated 2 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆93Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 6 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆125Updated 3 weeks ago
- ☆111Updated last week
- ☆63Updated last year
- Scripts to enumerate and report on Entra Conditional Access☆38Updated last week
- A small script that automates Entra ID persistence with Windows Hello For Business key☆62Updated 7 months ago
- Fast context enumeration for newly obtained Active Directory credentials.☆64Updated 3 weeks ago
- ☆46Updated last year
- ☆65Updated last year
- Living off the land searches for explorer and sharepoint☆90Updated 4 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆44Updated 2 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆54Updated last month
- ☆114Updated 2 months ago
- ☆50Updated 10 months ago