matro7sh / Yelaa
Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given perimeter )
☆25Updated last year
Alternatives and similar repositories for Yelaa:
Users that are interested in Yelaa are comparing it to the libraries listed below
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆23Updated last year
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 2 years ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆22Updated 10 months ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 3 years ago
- ☆52Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 6 months ago
- Decode the values of common Windows properties such as userAccountControl and sAMAccountType.☆21Updated last year
- A list of weird comparison in SQL☆14Updated 2 years ago
- Right-To-Left Override POC☆34Updated 2 years ago
- Get Fine Grained Password Policy☆66Updated 8 months ago
- ☆49Updated last year
- Mythic Developer Series: Workshop Golang Agent☆24Updated last year
- ☆57Updated 10 months ago
- Federated Office365 user enumeration based on correlated response trend analysis☆48Updated 2 years ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆13Updated 6 months ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆31Updated 2 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆12Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 7 months ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 9 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- ShellcodeFluctuation PoC ported to Nim☆75Updated 2 years ago
- ☆16Updated 3 months ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆10Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago