machosec / MystiqueView external linksLinks
PowerShell module to play with Kerberos S4U extensions
☆52Apr 2, 2017Updated 8 years ago
Alternatives and similar repositories for Mystique
Users that are interested in Mystique are comparing it to the libraries listed below
Sorting:
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆48Jun 5, 2017Updated 8 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- ☆23Feb 16, 2016Updated 9 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆319Dec 29, 2017Updated 8 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- Generates anti-sandbox analysis HTA files without payloads☆121Mar 16, 2017Updated 8 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Nov 10, 2018Updated 7 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆324Apr 26, 2020Updated 5 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Misc. PowerShell scripts☆120Jul 4, 2016Updated 9 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆322Jun 5, 2017Updated 8 years ago
- PowerDNS: Powershell DNS Delivery☆215Sep 26, 2018Updated 7 years ago
- ☆210Jan 30, 2019Updated 7 years ago
- Windows Privesc Check - PowerShell☆67Apr 22, 2022Updated 3 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,308Nov 22, 2022Updated 3 years ago
- Scripts and results for finding domain frontable CloudFront domains☆54Feb 23, 2018Updated 7 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- CSHARP DCOM Fun☆138Sep 16, 2019Updated 6 years ago
- random powershell goodness☆460Nov 21, 2024Updated last year
- Detect and abuse risky SPNs☆266Jun 15, 2017Updated 8 years ago
- Aggressor scripts I've made for Cobalt Strike☆413Jul 29, 2023Updated 2 years ago
- Search for categorized domain☆453Jan 15, 2019Updated 7 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- ☆98Feb 21, 2019Updated 6 years ago
- Domain fronting using Google app engine☆53Feb 19, 2018Updated 7 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆381Jul 25, 2019Updated 6 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,013Jul 3, 2018Updated 7 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- PEAS is a Python 2 library and command line application for running commands on an ActiveSync server e.g. Microsoft Exchange.☆184Jan 16, 2023Updated 3 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 6 years ago