hyd3sec / Azur3Alph4Links
Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved) position.
☆63Updated 3 years ago
Alternatives and similar repositories for Azur3Alph4
Users that are interested in Azur3Alph4 are comparing it to the libraries listed below
Sorting:
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Password Spraying Framework☆63Updated 3 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- ☆33Updated 5 years ago
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 6 months ago
- RDP Checker☆63Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- (kinda) Malicious Outlook Reader☆19Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆85Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆35Updated 2 years ago
- blame Huy☆42Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- An Ansible role for installing Cobalt Strike.☆78Updated last week
- Talk slides and material☆32Updated last year
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- This repo will contain some basic pentest/RT commands.☆38Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago