mandiant / harbingerLinks
☆139Updated 2 weeks ago
Alternatives and similar repositories for harbinger
Users that are interested in harbinger are comparing it to the libraries listed below
Sorting:
- Decrypt GlobalProtect configuration and cookie files.☆159Updated last year
- SCEP request tool for AD CS and Intune☆74Updated 2 months ago
- Adversary Emulation Framework☆128Updated 6 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆92Updated last month
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆258Updated 8 months ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆94Updated 6 months ago
- A simple POC to expose Mythic as a MCP server☆72Updated 9 months ago
- Orsted C2 Framework☆101Updated last week
- ☆95Updated 4 months ago
- Advanced In-Memory PowerShell Process Injection Framework☆72Updated 5 months ago
- Cross Compatible Command and Control☆47Updated last week
- Simple C2 using GitHub repository as comms channel.☆31Updated last year
- ☆86Updated 7 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated last year
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆124Updated last month
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆128Updated last year
- Living off the land searches for explorer and sharepoint☆92Updated 3 weeks ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.1☆67Updated 2 months ago
- Group Policy Objects manipulation and exploitation framework☆283Updated 3 weeks ago
- Abuse Azure API permissions for red teaming☆69Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆97Updated last year
- The DCERPC only printerbug.py version☆182Updated 2 months ago
- Local & remote Windows DLL Proxying☆169Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Updated 10 months ago
- Red Team Collaboration Infrastructure☆98Updated 8 months ago
- A Python POC for CRED1 over SOCKS5☆161Updated last year
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆173Updated 4 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆274Updated last week
- OAuth Device Code Phishing Toolkit☆102Updated 3 months ago