carlospolop / aws-Perms2ManagedPolicies
☆11Updated 7 months ago
Alternatives and similar repositories for aws-Perms2ManagedPolicies:
Users that are interested in aws-Perms2ManagedPolicies are comparing it to the libraries listed below
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 3 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- Tool written in Rust to perform Password Spraying attacks against Azure/Office 365 accounts☆17Updated last year
- ☆34Updated last year
- A small red team course☆35Updated last year
- ☆32Updated last year
- Discord C2 Profile for Mythic☆26Updated 2 weeks ago
- A Moodle Scanner☆39Updated 3 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆34Updated last month
- exfiltration/infiltration toolkit☆23Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- ☆52Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 8 months ago
- ☆51Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Tool for scanning domains for .git directories.☆13Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆15Updated last year
- Cobalt Strike BOFS☆15Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆42Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆22Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 9 months ago
- ☆15Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- Webshell agent in aspx and php☆19Updated 4 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 5 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated last year