nettitude / SharpConflux
☆65Updated last year
Alternatives and similar repositories for SharpConflux:
Users that are interested in SharpConflux are comparing it to the libraries listed below
- ☆25Updated this week
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆24Updated 2 months ago
- ☆49Updated 5 months ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆73Updated 10 months ago
- ☆54Updated last month
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆29Updated 3 weeks ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆31Updated last month
- Python3 rewrite of AsOutsider features of AADInternals☆43Updated 3 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆35Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆37Updated 2 weeks ago
- A C# project that builds a Web Applciation which redirects all HTTPS☆24Updated last month
- Sniffing files generator☆55Updated last month
- Scripts to interact with Microsoft Graph APIs☆36Updated 4 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆69Updated 11 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆31Updated last month
- time-based user enum via Basic Auth in Azure against Autodiscover☆32Updated 5 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 6 months ago
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- Click Once + App Domain☆61Updated last year
- Lateral Movement via the .NET Profiler☆79Updated 4 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- Impacket pre-compiled binaries☆15Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- ☆31Updated 2 months ago
- ☆71Updated last year
- ☆87Updated 2 years ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 4 months ago
- Microsoft Graph API post-exploitation toolkit☆94Updated 8 months ago
- ☆48Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago