its-a-feature / bifrost
Objective-C library and console to interact with Heimdal APIs for macOS Kerberos
☆146Updated last year
Alternatives and similar repositories for bifrost:
Users that are interested in bifrost are comparing it to the libraries listed below
- ☆97Updated 4 years ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆101Updated 3 years ago
- ☆161Updated 2 years ago
- ☆9Updated 3 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆128Updated 2 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆151Updated 6 years ago
- macOS Initial Access Payload Generator☆303Updated last year
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆166Updated last year
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆166Updated 4 years ago
- lateral movement techniques that can be used during red team exercises☆269Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆107Updated 3 months ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆254Updated 3 years ago
- ☆74Updated 3 years ago
- LDAP Querying without the Suck☆99Updated 4 months ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆145Updated 4 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆246Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆106Updated 5 years ago
- Code Exec via Excel☆86Updated 7 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆172Updated 6 years ago
- Quick and dirty dynamic redirect.rules generator☆156Updated 2 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆216Updated last year
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆108Updated 2 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆119Updated 3 years ago
- ☆92Updated 2 years ago
- Run Rubeus via Rundll32☆198Updated 4 years ago
- Python based BloodHound data importer☆146Updated last year
- Payload designed for targeting Jamf enrolled devices.☆37Updated last year
- Collection of macOS persistence methods and miscellaneous tools in JXA☆269Updated last year
- Evading WinDefender ATP credential-theft☆254Updated 5 years ago