its-a-feature / Orchard
JavaScript for Automation (JXA) tool to do Active Directory enumeration.
☆102Updated 3 years ago
Alternatives and similar repositories for Orchard:
Users that are interested in Orchard are comparing it to the libraries listed below
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆48Updated 4 years ago
- ☆76Updated 3 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- ☆47Updated 5 years ago
- Change up a binary's embedded resources with this little creature.☆33Updated 5 years ago
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆147Updated last year
- ☆15Updated 2 years ago
- Payload designed for targeting Jamf enrolled devices.☆37Updated last year
- D/Invoke port of UrbanBishop☆106Updated 4 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- ☆36Updated 4 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆46Updated 4 years ago
- LDAP Querying without the Suck☆99Updated 5 months ago
- Eating 2FA for Breakfast☆58Updated 2 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- ☆97Updated 4 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆38Updated 2 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆84Updated 4 years ago
- JXA situational awareness helper by simply reading specific files on a filesystem☆77Updated 3 years ago
- Simple .NET assembly to interact with services.☆40Updated 5 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆110Updated 2 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆90Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆92Updated 2 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28Updated 5 years ago
- ☆93Updated 2 years ago
- Code Exec via Excel☆87Updated 7 years ago
- ☆54Updated last year
- ☆9Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago