caeksec / rules
Updated version of n0kovo's Rule List
☆25Updated 5 months ago
Alternatives and similar repositories for rules:
Users that are interested in rules are comparing it to the libraries listed below
- pysnaffler☆91Updated last month
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated 2 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆21Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆25Updated 3 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆37Updated 2 months ago
- Efflanrs - GUI for Snaffler Output☆26Updated 7 months ago
- ☆47Updated last year
- Parses Snaffler output file and generate beautified outputs.☆92Updated 2 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆99Updated 5 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆31Updated last month
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- Living Off the Foreign Land setup scripts☆67Updated last month
- A Python POC for CRED1 over SOCKS5☆147Updated 6 months ago
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆29Updated 3 years ago
- bowing to the AI Overlords.☆22Updated 4 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated 11 months ago
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Updated 9 months ago
- Impacket pre-compiled binaries☆15Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Custom queries list for BloodHound☆23Updated 7 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 11 months ago
- A small go tool to upload JSON files to the BloodHound community edition API☆30Updated 10 months ago
- ☆71Updated last year
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆55Updated 2 weeks ago
- Living off the land searches for explorer and sharepoint☆78Updated 5 months ago
- An easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆73Updated 3 weeks ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆37Updated last year
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆14Updated 7 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 7 months ago