nccgroup / CarnivoreLinks
Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb
☆147Updated 4 years ago
Alternatives and similar repositories for Carnivore
Users that are interested in Carnivore are comparing it to the libraries listed below
Sorting:
- PoSh BloodHound Dog Whisperer☆191Updated 2 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 3 years ago
- User enumeration with Microsoft Teams API☆173Updated 4 years ago
- Python based BloodHound data importer☆146Updated 2 years ago
- Material for the "Hands-On BloodHound" Workshop☆109Updated 4 years ago
- Lateral Movement graph for Azure Active Directory☆123Updated 2 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆225Updated 4 years ago
- ☆163Updated 2 years ago
- A curated list of awesome BloodhoundAD resources☆234Updated 2 years ago
- Collection of cyphers for bloodhound☆151Updated last year
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆235Updated 3 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆190Updated 4 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆230Updated 4 years ago
- ☆9Updated 4 years ago
- GoldenSAML Attack Libraries and Framework☆73Updated last year
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Updated 4 years ago
- Microsoft External Attack Tool☆179Updated 2 years ago
- .NET 4.0 Console App to browse VMDK / VHD images and extract files☆194Updated 5 years ago
- ☆77Updated last month
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆259Updated 3 years ago
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆299Updated 5 years ago
- Resources for our Active Directory security workshops☆140Updated 3 years ago
- Machine Learning Network Share Password Hunting Toolkit☆127Updated 5 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆107Updated last year
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆166Updated 4 years ago
- ☆108Updated 3 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆217Updated 2 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆66Updated 4 years ago
- ☆93Updated 4 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆218Updated 4 years ago