idnahacks / NetCeasePlusPlus
Takes the original idea of NetCease and adds functionality
☆24Updated 3 years ago
Alternatives and similar repositories for NetCeasePlusPlus:
Users that are interested in NetCeasePlusPlus are comparing it to the libraries listed below
- ☆23Updated 3 years ago
- Threat Mitigation Strategies☆25Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- BloodHound Data Scanner☆45Updated 4 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 5 years ago
- Continuous kerberoast monitor☆45Updated last year
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Updated 2 months ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 2 years ago
- ☆18Updated last year
- ☆35Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Ansible role that Installs Mythic☆15Updated 10 months ago
- Scripts to enumerate and report on Entra Conditional Access☆30Updated this week
- ☆45Updated last year
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- ☆36Updated 11 months ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Leghorn code for PKI abuse☆32Updated 3 years ago
- ☆11Updated 4 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 2 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- Find world writable directories that contain a .exe or .dll file☆12Updated 3 years ago