fkasler / dolosjs
Red Team "Drop and Run" NAC (802.1x) Bypass
☆70Updated last year
Alternatives and similar repositories for dolosjs:
Users that are interested in dolosjs are comparing it to the libraries listed below
- pysnaffler☆90Updated 2 months ago
- Efflanrs - GUI for Snaffler Output☆26Updated 6 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated last year
- Get Fine Grained Password Policy☆67Updated 10 months ago
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆37Updated 3 weeks ago
- ☆116Updated last year
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- ☆157Updated 4 months ago
- A Python POC for CRED1 over SOCKS5☆140Updated 5 months ago
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 2 years ago
- Hybrid AD utilities for ROADtools☆69Updated last month
- ☆88Updated last month
- Living Off the Foreign Land setup scripts☆65Updated 2 weeks ago
- ☆71Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- ☆136Updated last year
- using graph proxy to monitor teams user presence☆54Updated 8 months ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆119Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆89Updated 10 months ago
- ☆45Updated last month
- Living off the land searches for explorer and sharepoint☆57Updated 4 months ago
- ☆36Updated 3 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆110Updated last month
- Artifact monitoring that ensures fairplay☆75Updated last month
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆112Updated 4 years ago
- ☆86Updated 2 years ago