citrix / ioc-scanner-CVE-2019-19781
Indicator of Compromise Scanner for CVE-2019-19781
☆58Updated 4 years ago
Related projects: ⓘ
- Indicator of Compromise Scanner for CVE-2019-19781☆92Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 4 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆27Updated 6 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆11Updated last month
- A rogue DNS detector☆23Updated 11 months ago
- Powershell / C# based cross platform forensic framework based for live incident response☆21Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆26Updated 4 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆22Updated 2 months ago
- Some simple scripts for decrypting passwords retrieved from a Manage Engine OpManager installation☆11Updated 8 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- An attempt to automated hunting for delegation access across the domain☆28Updated 5 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Updated 6 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago
- Defensive-oriented Active Directory enumeration☆23Updated 8 years ago
- A mini project to exfiltrate data via QR codes☆19Updated 5 months ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Microsoft Flow Attack Framework☆23Updated 4 years ago
- ☆12Updated 6 years ago
- BloodHound Data Scanner☆43Updated 4 years ago
- ☆14Updated 5 months ago
- ☆14Updated 3 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 3 years ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 4 years ago
- ☆22Updated 3 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆18Updated 10 months ago
- PowerShell wrapper for nmap, allows easy scanning of many hosts and subnets☆17Updated 6 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆32Updated 5 years ago