fastlorenzo / redelk-ansible
Ansible roles to deploy RedELK
☆16Updated last year
Alternatives and similar repositories for redelk-ansible:
Users that are interested in redelk-ansible are comparing it to the libraries listed below
- This repo hosts a poc of how to execute F# code within an unmanaged process☆66Updated 7 months ago
- ☆54Updated 3 years ago
- terraform deployment for red team☆21Updated 2 years ago
- ☆18Updated last year
- ☆38Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆51Updated 7 months ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆83Updated 8 months ago
- Living Off the Foreign Land setup scripts☆64Updated 3 weeks ago
- ☆83Updated 2 years ago
- Utilities for obfuscating shellcode☆51Updated 7 months ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆69Updated 4 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆18Updated 2 years ago
- ☆70Updated last year
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- D/Invoke port of UrbanBishop☆105Updated 4 years ago
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆35Updated 3 years ago
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Updated 7 months ago
- D/Invoke standalone shellcode runners☆37Updated last year
- ☆98Updated 9 months ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆54Updated 4 years ago
- ☆71Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆26Updated last year
- Collection of Offensive C# Tooling☆12Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆48Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- ☆69Updated 3 years ago
- ☆24Updated 3 years ago
- ☆28Updated 5 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 7 months ago