its-a-feature / Orchard
JavaScript for Automation (JXA) tool to do Active Directory enumeration.
☆101Updated 3 years ago
Alternatives and similar repositories for Orchard:
Users that are interested in Orchard are comparing it to the libraries listed below
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- ☆76Updated 3 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- JXA situational awareness helper by simply reading specific files on a filesystem☆76Updated 3 years ago
- Change up a binary's embedded resources with this little creature.☆33Updated 5 years ago
- Library of sites for categorization☆26Updated 6 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- ☆52Updated 7 months ago
- LDAP Querying without the Suck☆99Updated 4 months ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆46Updated 4 months ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆108Updated 4 months ago
- ☆9Updated 3 years ago
- ☆54Updated last year
- Exchangelib wrapper for pentesting☆61Updated last month
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆46Updated 3 years ago
- Eating 2FA for Breakfast☆58Updated 2 years ago
- D/Invoke port of UrbanBishop☆106Updated 4 years ago
- terraform deployment for red team☆22Updated 2 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆84Updated 4 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆97Updated last year
- Payload designed for targeting Jamf enrolled devices.☆37Updated last year
- ☆92Updated 2 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆85Updated 2 years ago
- This code was used for the blogpost on secjuice.☆42Updated 5 years ago
- ☆132Updated last year