dazzyddos / dazzyddos.github.ioLinks
A blog where I write stuffs in order to understand them better.
☆12Updated 9 months ago
Alternatives and similar repositories for dazzyddos.github.io
Users that are interested in dazzyddos.github.io are comparing it to the libraries listed below
Sorting:
- ☆84Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- blame Huy☆42Updated 5 years ago
- ☆105Updated 3 years ago
- Tool to extract powerful tokens from Office desktop apps memory☆73Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- ☆41Updated 2 years ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆48Updated last year
- Tool to perform lateral movement between AAD joined devices☆66Updated 3 years ago
- Talk slides and material☆37Updated last year
- Collection of tools to use with Azure Applications☆112Updated 2 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Updated 3 weeks ago
- ☆107Updated 3 years ago
- Fun GUI for Group3rs output log☆37Updated 2 years ago
- ☆29Updated 2 years ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Updated 5 years ago
- ☆86Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 3 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated 2 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- ☆40Updated last year
- ☆21Updated 4 months ago
- ☆47Updated 2 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- a tiny program to consume from ETW providers for research☆53Updated last year
- DEFCON 31 slide deck and video link☆66Updated 8 months ago