n0tspam / delepwn
☆14Updated 2 months ago
Alternatives and similar repositories for delepwn:
Users that are interested in delepwn are comparing it to the libraries listed below
- ☆2Updated 2 months ago
- ☆17Updated last year
- A simple to use single-include Windows API resolver☆19Updated 7 months ago
- Nemesis agent for Mythic☆26Updated 5 months ago
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 10 months ago
- Scripts to interact with Microsoft Graph APIs☆33Updated 3 months ago
- Ansible role that Installs Mythic☆14Updated 7 months ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 10 months ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- ☆15Updated last year
- ☆16Updated 11 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 9 months ago
- .NET wrapper around LogonUserA to test creds☆11Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆37Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A user enumeration tool for Slack.☆24Updated 8 months ago
- ☆13Updated last year
- Discord C2 Profile for Mythic☆26Updated this week
- Top hashpwn rules☆17Updated 2 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆28Updated last year
- ☆20Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year