monoxgas / FlyingAFalseFlag
Slides and Code for the BHUSA 2019 talk: Flying a False Flag
☆233Updated 5 years ago
Alternatives and similar repositories for FlyingAFalseFlag:
Users that are interested in FlyingAFalseFlag are comparing it to the libraries listed below
- Powershell script for enumerating vulnerable DCOM Applications☆257Updated 6 years ago
- An Insider Threat Toolkit☆149Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆270Updated 5 years ago
- ☆190Updated 5 years ago
- Lateral Movement technique using DCOM and HTA☆231Updated 2 years ago
- Parse NTLM challenge messages over HTTP and SMB☆144Updated 2 years ago
- A HTA shell to assist with breakout assessments.☆112Updated 3 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆145Updated 5 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆303Updated 2 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆167Updated 4 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆119Updated 5 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆112Updated 5 years ago
- Constrained Language Mode + AMSI bypass all in one☆156Updated 5 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆90Updated 5 years ago
- Domain user enumeration tool☆215Updated last year
- DupeKeyInjector☆135Updated 2 years ago
- Burp Suite extension to perform Kerberos authentication☆104Updated 9 months ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆325Updated 5 years ago
- Resources for our Active Directory security workshops☆140Updated 3 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆323Updated 6 years ago
- A curated list of awesome BloodhoundAD resources☆230Updated 2 years ago
- ☆234Updated 5 years ago
- ☆128Updated last year
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆132Updated 6 years ago
- Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)☆142Updated 7 years ago
- ntlm relay attack to Exchange Web Services☆331Updated 7 years ago
- Presentation material presented by Outflank team members at public events.☆186Updated 3 months ago
- ☆228Updated 6 years ago