maus- / slack-auditor
Provides an easy way to collect and send Slack access & integration logs.
☆13Updated 2 years ago
Related projects: ⓘ
- JXA script for Mythic that prints the TCC.db☆15Updated 3 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆16Updated 2 years ago
- TITO is a light framework for operationalizing threat intelligence that is platform and data agnostic.☆20Updated 4 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆44Updated 3 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆30Updated 3 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆18Updated 3 years ago
- Automated deployment and configuration of a Mythic server using Terraform and Ansible☆9Updated last year
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆12Updated 2 years ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- checks site content against known good ssdeep hash, identifies matches☆10Updated 5 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆40Updated 3 years ago
- Payload designed for targeting Jamf enrolled devices.☆35Updated last year
- Golang command line tool for the macOS Endpoint Security Framework☆29Updated 4 years ago
- ☆18Updated this week
- The SSH Multiplex Backdoor Tool☆62Updated 4 years ago
- newly registered domain name/brand infringement detector☆23Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆13Updated 2 years ago
- Ansible scripts to build an attack box☆22Updated 5 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆22Updated 3 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆14Updated 4 years ago
- Collection of Slides From My Conference Talks☆20Updated last year
- JXA situational awareness helper by simply reading specific files on a filesystem☆66Updated 2 years ago
- A CLI tool for querying passive DNS services☆41Updated 9 months ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 2 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 6 years ago
- extracts shellcode from a nasm compile macho binary☆16Updated 3 years ago