nyxgeek / track_the_planetView external linksLinks
DEFCON 31 slide deck and video link
☆66Jun 2, 2025Updated 8 months ago
Alternatives and similar repositories for track_the_planet
Users that are interested in track_the_planet are comparing it to the libraries listed below
Sorting:
- using graph proxy to monitor teams user presence☆55Jun 27, 2024Updated last year
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated last year
- Canary Detection☆188Oct 20, 2025Updated 3 months ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 5 months ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- tool for identifying guest relationships between companies☆102Jun 27, 2024Updated last year
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- ☆13Oct 21, 2023Updated 2 years ago
- A library for interacting with Windows through SMB written in Nim.☆16Sep 14, 2025Updated 5 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆741Jul 29, 2025Updated 6 months ago
- ☆17Jun 25, 2024Updated last year
- ☆84Nov 21, 2024Updated last year
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- ☆42Jun 1, 2025Updated 8 months ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆135Dec 20, 2022Updated 3 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128May 28, 2024Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆94Jul 3, 2025Updated 7 months ago
- Ludus range for the Constructing Defense Lab☆74Nov 10, 2025Updated 3 months ago
- Active C&C Detector☆155Oct 5, 2023Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,368Oct 22, 2025Updated 3 months ago
- ☆105Jul 11, 2024Updated last year
- Secure Terminal CTF Challenge for DC31 Red Team Village☆19Aug 22, 2023Updated 2 years ago
- ☆230Jun 10, 2025Updated 8 months ago
- Okta Verify and Okta FastPass Abuse Tool☆339Sep 4, 2024Updated last year
- DJI Drone Control Hijacking☆41Sep 13, 2023Updated 2 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 4 months ago
- An offensive data enrichment pipeline☆914Updated this week
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,249Jul 22, 2025Updated 6 months ago
- My conference presentations☆87Nov 11, 2025Updated 3 months ago
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆43Nov 22, 2025Updated 2 months ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆302Jan 20, 2026Updated 3 weeks ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆65Feb 16, 2025Updated last year