cpp-cyber / blue
☆8Updated 2 months ago
Alternatives and similar repositories for blue:
Users that are interested in blue are comparing it to the libraries listed below
- An ADCS honeypot to catch attackers in your internal network.☆286Updated 9 months ago
- Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.☆26Updated last month
- Abusing Intune for Lateral Movement over C2☆332Updated 2 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆110Updated 10 months ago
- Active Directory delegation management tool☆292Updated last year
- Monitor your PingCastle scans to highlight the rule diff between two scans☆111Updated 8 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆258Updated 4 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated 10 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆250Updated last year
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆366Updated 10 months ago
- Some Unhinged Guy Made Another All-in-one Scoring Engine☆24Updated this week
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆150Updated 11 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆231Updated 3 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆193Updated 3 months ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆46Updated 2 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆276Updated 8 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆180Updated last year
- ☆298Updated 5 months ago
- Protect your Domain Controllers by auditing and restricting LDAP requests☆151Updated 3 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 3 weeks ago
- A tiny tool built to find and fix common misconfigurations in Active Directory-integrated DNS☆112Updated 2 months ago
- Infrastructure Automation☆344Updated last year
- Python DPAPI NG Decryptor for non-Windows Platforms☆62Updated 4 months ago
- DEFCON 31 slide deck and video link☆58Updated 9 months ago
- ☆190Updated 6 months ago
- An Ansible collection that installs an SCCM deployment with optional configurations.☆76Updated 9 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆265Updated 2 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆141Updated last month
- ☆210Updated 3 weeks ago
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆56Updated this week