DEFCON 31 slide deck and video link
☆67Jun 2, 2025Updated 9 months ago
Alternatives and similar repositories for track_the_planet
Users that are interested in track_the_planet are comparing it to the libraries listed below
Sorting:
- using graph proxy to monitor teams user presence☆56Jun 27, 2024Updated last year
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- Canary Detection☆190Oct 20, 2025Updated 4 months ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- tool for identifying guest relationships between companies☆103Jun 27, 2024Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- ☆13Oct 21, 2023Updated 2 years ago
- A library for interacting with Windows through SMB written in Nim.☆16Sep 14, 2025Updated 5 months ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆745Jul 29, 2025Updated 7 months ago
- ☆18Jun 25, 2024Updated last year
- ☆84Nov 21, 2024Updated last year
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- Ludus range for the Constructing Defense Lab☆106Feb 23, 2026Updated 2 weeks ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆136Dec 20, 2022Updated 3 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127May 28, 2024Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- ☆43Jun 1, 2025Updated 9 months ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,371Oct 22, 2025Updated 4 months ago
- ☆105Jul 11, 2024Updated last year
- Secure Terminal CTF Challenge for DC31 Red Team Village☆19Aug 22, 2023Updated 2 years ago
- ☆232Jun 10, 2025Updated 8 months ago
- Okta Verify and Okta FastPass Abuse Tool☆340Sep 4, 2024Updated last year
- DJI Drone Control Hijacking☆42Sep 13, 2023Updated 2 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 5 months ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆42Nov 22, 2025Updated 3 months ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,256Jul 22, 2025Updated 7 months ago
- Impacket is a collection of Python classes for working with network protocols.☆303Jan 20, 2026Updated last month
- An offensive data enrichment pipeline☆924Mar 3, 2026Updated last week
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆66Feb 16, 2025Updated last year
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 3 months ago
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated 11 months ago