juaromu / chainsaw
☆13Updated 2 years ago
Alternatives and similar repositories for chainsaw:
Users that are interested in chainsaw are comparing it to the libraries listed below
- Searching .evtx logs for remote connections☆23Updated last year
- Execute embedded Mimikatz☆13Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- A collection of my presentation materials.☆17Updated 11 months ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Strategy for building a Red Team☆17Updated last year
- Remote code execution in Power Platform connectors via JSON deserialization☆21Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Active Directory Password Spray Testing Utility in Go☆16Updated last year
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- ☆15Updated 3 years ago
- API hooking and code injection made easy!☆36Updated last year
- ☆52Updated last year
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆25Updated 4 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- ☆15Updated last year
- Offensive tool for guessing Active Directory credentials via Kerberos☆9Updated last year
- ☆16Updated last year
- ☆23Updated 3 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago