its-a-feature / bifrostLinks
Objective-C library and console to interact with Heimdal APIs for macOS Kerberos
☆152Updated 2 years ago
Alternatives and similar repositories for bifrost
Users that are interested in bifrost are comparing it to the libraries listed below
Sorting:
- ☆99Updated 4 years ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆106Updated 3 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆179Updated 2 years ago
- ☆10Updated 4 years ago
- ☆116Updated 6 months ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆113Updated 2 years ago
- Quick and dirty dynamic redirect.rules generator☆165Updated 2 years ago
- Python based BloodHound data importer☆147Updated 2 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆86Updated 2 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 5 years ago
- Code Exec via Excel☆88Updated 8 years ago
- ☆77Updated 3 months ago
- LDAP Querying without the Suck☆110Updated 11 months ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- Payload designed for targeting Jamf enrolled devices.☆38Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- BH Cypher Queries picked up from random places☆39Updated 6 years ago
- macOS Initial Access Payload Generator☆315Updated last year
- Password Spraying Script detecting current and previous passwords of Active Directory User☆66Updated 4 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 4 years ago
- Exchangelib wrapper for pentesting☆64Updated 7 months ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆148Updated 4 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆124Updated 4 years ago
- Managed code hooking template.☆108Updated 4 years ago
- ☆166Updated 2 years ago
- Proper Payload Protection Prevents Poor Performance☆74Updated 3 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆167Updated 5 years ago
- ☆108Updated 3 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago