mandiant / harbingerLinks
☆147Updated this week
Alternatives and similar repositories for harbinger
Users that are interested in harbinger are comparing it to the libraries listed below
Sorting:
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆93Updated 2 weeks ago
- SCEP request tool for AD CS and Intune☆73Updated 3 months ago
- Abuse Azure API permissions for red teaming☆71Updated 3 years ago
- Decrypt GlobalProtect configuration and cookie files.☆158Updated last year
- Active Directory Authentication Library☆90Updated 3 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆290Updated 2 weeks ago
- Adversary Emulation Framework☆129Updated 7 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated 3 months ago
- Living off the land searches for explorer and sharepoint☆92Updated 2 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- ☆166Updated last year
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆284Updated 9 months ago
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆134Updated last year
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆173Updated 5 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆164Updated last year
- Tool to extract username and password of current user from PanGPA in plaintext☆89Updated last year
- The DCERPC only printerbug.py version☆200Updated 3 months ago
- OAuth Device Code Phishing Toolkit☆109Updated this week
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆99Updated last year
- Simple C2 using GitHub repository as comms channel.☆31Updated last year
- Group Policy Objects manipulation and exploitation framework☆288Updated 2 months ago
- The Azure Execution Tool☆37Updated last week
- Advanced In-Memory PowerShell Process Injection Framework☆72Updated 6 months ago
- ☆120Updated 10 months ago
- Python based GUI for browsing LDAP☆179Updated 2 months ago
- Red Team Collaboration Infrastructure☆98Updated 9 months ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆182Updated 5 months ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆184Updated 4 months ago
- ☆79Updated last year