matro7sh / Yelaa
Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given perimeter )
☆25Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Yelaa
- Check robustness of your (their) Active Directory accounts passwords☆32Updated 8 months ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆23Updated last year
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆28Updated 7 months ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- ☆17Updated last year
- ☆51Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- A Python script to parse Fortinet products serial numbers, and detect the associated model and revision.☆13Updated last year
- offensive notes & resources☆40Updated this week
- ☆11Updated 3 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆88Updated last year
- A little implant which SSH's back with a shell☆36Updated 2 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆45Updated 2 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆49Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 4 months ago
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆26Updated 8 months ago
- Use python to perform Kerberos pre-auth bruteforcing☆11Updated 2 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆15Updated 11 months ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆15Updated 2 weeks ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆38Updated 3 years ago
- load dumped csharp binaries as assemblies and launch them in memory☆26Updated 9 months ago
- ☆43Updated 4 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆63Updated 7 months ago