morRubin / PrtToCert
☆20Updated 4 years ago
Alternatives and similar repositories for PrtToCert:
Users that are interested in PrtToCert are comparing it to the libraries listed below
- ☆20Updated 3 years ago
- ☆24Updated 3 years ago
- Tool to perform lateral movement between AAD joined devices☆58Updated 2 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- ☆13Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆17Updated 2 months ago
- Ansible role that Installs Mythic☆14Updated 9 months ago
- ☆17Updated 6 years ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆17Updated 9 months ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Change up a binary's embedded resources with this little creature.☆33Updated 5 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- PetitPotam fork with Kerberos support in the impacket script☆17Updated 3 years ago
- BloodHound Data Scanner☆45Updated 4 years ago
- Protect your servers with a secret header☆29Updated 4 years ago
- ☆14Updated last year
- ☆15Updated 2 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆48Updated 4 years ago
- Some of my custom "tools".☆23Updated 3 years ago
- Helpful operator notes and techniques in actionable form☆16Updated last year
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆29Updated 3 years ago
- (kinda) Malicious Outlook Reader☆18Updated 4 years ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- ☆37Updated 3 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago