mubix / solarflare
SolarWinds Orion Account Audit / Password Dumping Utility
☆354Updated last year
Alternatives and similar repositories for solarflare
Users that are interested in solarflare are comparing it to the libraries listed below
Sorting:
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- ☆384Updated 2 months ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆573Updated 5 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆611Updated 2 years ago
- Overlord - Red Teaming Infrastructure Automation☆619Updated 11 months ago
- SunBurst DGA Decode Script☆207Updated 4 years ago
- ☆334Updated 2 years ago
- gather gather gather☆576Updated 2 months ago
- ☆282Updated 7 years ago
- Search for potential frontable domains☆625Updated 2 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆212Updated 4 years ago
- CVE-2021-1675 Detection Info☆216Updated last year
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆256Updated 2 years ago
- Microsoft External Attack Tool☆179Updated 2 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆316Updated 5 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆396Updated last year
- ☆100Updated 4 years ago
- Network Pivoting Toolkit☆445Updated last year
- Credential and Red Teaming Defense for Windows Environments☆329Updated 10 months ago
- Misc Threat Hunting Resources☆373Updated 2 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆217Updated 3 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆334Updated 6 years ago
- ATTPwn☆213Updated last year
- Collection of tools that reflect the network dimension into Bloodhound's data☆447Updated 2 years ago
- A PowerShell module to deploy active directory decoy objects.☆228Updated 5 years ago
- ☆260Updated 2 years ago
- LinkedIn reconnaissance tool☆52Updated 3 years ago
- A tool that implements the Golden SAML attack☆336Updated 6 years ago
- ☆162Updated last year