ezra-buckingham / terry-the-terraformer
A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK integration
☆117Updated last year
Alternatives and similar repositories for terry-the-terraformer
Users that are interested in terry-the-terraformer are comparing it to the libraries listed below
Sorting:
- LDAP Querying without the Suck☆100Updated 6 months ago
- ☆139Updated last year
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated 2 years ago
- SpecterOps Presentations☆195Updated last week
- Modular Enumeration and Password Spraying Framework☆117Updated last year
- ☆151Updated 3 months ago
- ☆53Updated 8 months ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- ☆117Updated 3 years ago
- ☆144Updated last month
- A tool for pointesters to find candies in SharePoint☆254Updated 2 years ago
- Collection of tools to use with Azure Applications☆108Updated last year
- Collection of cyphers for bloodhound☆150Updated 10 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆93Updated 2 years ago
- ☆104Updated last year
- Gets the name of all currently running process then checks them against a list of known defensive products such as AV's, EDR's and loggin…☆14Updated 2 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆101Updated 2 years ago
- Quick and dirty dynamic redirect.rules generator☆158Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆70Updated 5 months ago
- OPSEC safe Kerberoasting in C#☆191Updated 2 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆388Updated last year
- [S]imple [T]actical [A]gent [R]elay: A peer-to-peer C2-ish framework for Ethical Hackers and Security Researchers.☆31Updated 3 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆120Updated 4 years ago
- ☆159Updated 6 months ago
- ☆208Updated 3 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆175Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆332Updated last year