bouj33boy / Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024Links
Resources Links for the Research Based on Josh Prager and Nico Shyne's
☆13Updated last year
Alternatives and similar repositories for Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024
Users that are interested in Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024 are comparing it to the libraries listed below
Sorting:
- An Ansible collection that installs an ADFS deployment with optional configurations.☆42Updated last week
- A small go tool to upload JSON files to the BloodHound community edition API☆30Updated last year
- ☆36Updated 2 years ago
- Microsoft Graph API post-exploitation toolkit☆95Updated last year
- ☆34Updated 5 months ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆65Updated 10 months ago
- Fun GUI for Group3rs output log☆37Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆81Updated 11 months ago
- ☆113Updated 6 months ago
- AAD related enumeration in Nim☆133Updated 2 years ago
- ☆47Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆50Updated 5 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆130Updated 4 months ago
- Abuse Azure API permissions for red teaming☆69Updated 2 years ago
- BloodHound PowerShell client☆75Updated 2 weeks ago
- Living off the land searches for explorer and sharepoint☆92Updated 3 weeks ago
- A python library to create BloodHound OpenGraphs☆39Updated 2 weeks ago
- An offensive toolkit for restless guests #DEFCON33☆54Updated 4 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆66Updated 9 months ago
- POC tool to abuse windows server failover clusters☆49Updated 4 months ago
- ☆88Updated 3 years ago
- ☆65Updated last year
- A dotnet executable to get an Entra token in an authenticated runtime☆15Updated last year
- ☆50Updated 8 months ago
- ☆44Updated 10 months ago
- ☆133Updated 3 months ago
- Scripts to enumerate and report on Entra Conditional Access☆39Updated 3 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆90Updated 5 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆48Updated 2 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆93Updated 2 years ago