froyo75 / SpREaDLinks
A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.
☆16Updated last month
Alternatives and similar repositories for SpREaD
Users that are interested in SpREaD are comparing it to the libraries listed below
Sorting:
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- Find Inbound Email Domains☆35Updated last year
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- Convert an LDIF file to JSON files ingestible by BloodHound☆44Updated 7 months ago
- terraform deployment for red team☆25Updated 2 years ago
- ☆41Updated 5 months ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆65Updated 9 months ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆33Updated last month
- A python library to create BloodHound OpenGraphs☆35Updated 3 weeks ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆42Updated 11 months ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆32Updated 8 months ago
- ☆57Updated 5 months ago
- ☆74Updated 5 months ago
- SMB Audit Tool you were looking for☆23Updated 2 years ago
- Hiding your infrastructure from the boys in blue.☆23Updated 4 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 3 years ago
- A dotnet executable to get an Entra token in an authenticated runtime☆15Updated last year
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Updated last year
- ☆52Updated last year
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆69Updated 3 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆46Updated last month
- POC tool to abuse windows server failover clusters☆46Updated 3 months ago
- Extract registry and NTDS secrets from local or remote disk images☆44Updated 8 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆57Updated 4 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated 2 years ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆46Updated 2 months ago
- Your Skyfall Infrastructure Pack☆87Updated 2 weeks ago
- A small go tool to upload JSON files to the BloodHound community edition API☆30Updated last year