its-a-feature / KeytabParser
Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)
☆34Updated 5 years ago
Related projects: ⓘ
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- ☆11Updated this week
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆44Updated 3 years ago
- Cobalt Strike log state tracking, parsing, and storage☆22Updated 5 years ago
- A list of IOCs applicable to PoshC2☆23Updated 4 years ago
- Network Finger Printer☆16Updated 6 years ago
- ☆10Updated 4 years ago
- A script to automate Jenkins credential store decryption☆16Updated 6 years ago
- Library of traffic redirectors☆26Updated 4 years ago
- ☆30Updated 6 years ago
- Short handy snippets from the @mwrlabs team☆20Updated 6 years ago
- Cybersecurity Incidents Mind Maps☆32Updated 2 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- Protect your servers with a secret header☆28Updated 4 years ago
- BloodHound Data Scanner☆43Updated 4 years ago
- ☆17Updated 5 years ago
- Old home of LimaCharlie, open source EDR☆29Updated last year
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 4 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆28Updated 6 years ago
- JXA script for Mythic that prints the TCC.db☆15Updated 3 years ago
- Red Team Automation tool powered by go and terraform☆27Updated 3 years ago
- C# User Simulation☆33Updated last year
- pypykatz plugin for volatility3 framework☆30Updated 5 months ago
- Walking the PEB in VBA☆22Updated 4 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆28Updated 10 years ago
- various slides and presentations I've worked on☆18Updated 6 months ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago