inzlain / sameuserLinks
Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual
☆14Updated 3 years ago
Alternatives and similar repositories for sameuser
Users that are interested in sameuser are comparing it to the libraries listed below
Sorting:
- ☆14Updated 4 years ago
- Ansible role that Installs Mythic☆18Updated last year
- ☆18Updated 2 years ago
- Firebase Domain Front Code☆21Updated 4 years ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- ☆14Updated 2 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Updated 4 years ago
- A simple to use single-include Windows API resolver☆23Updated last year
- The Totally Legit Authentication Dialog☆12Updated 2 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Updated 3 years ago
- Ansible role to deploy RedELK server☆18Updated 2 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Updated 4 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- A tool to sync mythic events with ghostwriter oplog.☆13Updated 10 months ago
- ☆19Updated last year
- Test Azure environment for MFA misconfigurations☆12Updated 2 years ago
- Nemesis agent for Mythic☆27Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 3 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Updated 6 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Updated 4 years ago
- ☆13Updated 5 months ago
- ☆26Updated 4 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆11Updated 4 months ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago