fozavci / ta505plus
TA505+ Adversary Simulation
☆65Updated 4 years ago
Alternatives and similar repositories for ta505plus:
Users that are interested in ta505plus are comparing it to the libraries listed below
- ☆55Updated 4 years ago
- ☆74Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆102Updated 2 years ago
- Tool that automates Active Directory enumeration☆89Updated 3 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated 8 months ago
- ☆47Updated 4 years ago
- ☆41Updated 5 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- ☆77Updated 5 years ago
- Petaq - Purple Team Command & Control Server☆103Updated 2 years ago
- ☆51Updated 6 years ago
- ☆20Updated 4 years ago
- ☆12Updated 3 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 3 years ago
- ☆139Updated 5 years ago
- ☆69Updated 3 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆85Updated 2 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- An Ansible role for installing Cobalt Strike.☆76Updated this week
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆166Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆106Updated 5 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated 2 weeks ago
- ☆26Updated 3 years ago
- This repo is dedicated to a powerpoint exploit☆35Updated 4 years ago
- ☆9Updated 3 years ago