ezra-buckingham / terry-the-terraformerLinks
A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK integration
☆119Updated 2 years ago
Alternatives and similar repositories for terry-the-terraformer
Users that are interested in terry-the-terraformer are comparing it to the libraries listed below
Sorting:
- LDAP Querying without the Suck☆110Updated last year
- ☆55Updated last year
- Quick and dirty dynamic redirect.rules generator☆166Updated 3 years ago
- ☆141Updated 2 years ago
- ☆60Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated last year
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- ☆119Updated 4 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Updated 2 years ago
- ☆105Updated 2 years ago
- Modular Enumeration and Password Spraying Framework☆129Updated last year
- ☆104Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Collection of tools to use with Azure Applications☆109Updated 2 years ago
- ☆191Updated 2 years ago
- using graph proxy to monitor teams user presence☆54Updated last year
- SpecterOps Presentations☆209Updated 4 months ago
- Artifact monitoring that ensures fairplay☆78Updated 9 months ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- ☆23Updated 3 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆98Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆122Updated 3 years ago
- ☆117Updated 4 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆188Updated 2 years ago
- Source Code Management Attack Toolkit☆135Updated 3 years ago
- Exchangelib wrapper for pentesting☆67Updated 8 months ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Updated 2 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆125Updated 5 years ago
- ☆39Updated 4 years ago
- Simple PoC in PowerShell for CVE-2023-23397☆39Updated 2 years ago