Your go-to resource for all things OSINT
☆181Mar 28, 2024Updated last year
Alternatives and similar repositories for OSINT_Encyclopedia
Users that are interested in OSINT_Encyclopedia are comparing it to the libraries listed below
Sorting:
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆445Aug 18, 2023Updated 2 years ago
- An Office365 User Attack Tool☆646Mar 19, 2024Updated last year
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆342Jun 6, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆104Aug 17, 2021Updated 4 years ago
- In-memory token vault BOF for Cobalt Strike☆149Aug 18, 2022Updated 3 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆60Dec 15, 2023Updated 2 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- C# version of Powermad☆169Dec 5, 2023Updated 2 years ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆94Dec 8, 2022Updated 3 years ago
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Sep 29, 2021Updated 4 years ago
- Koppeling x Metatwin x LazySign☆216Aug 26, 2021Updated 4 years ago
- A Holistic OSINT and Threat Hunting Platform☆530Jan 2, 2025Updated last year
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆549Sep 2, 2022Updated 3 years ago
- Notes about the YouTube playlist: Red Team Operations with Cobalt Strike (2019)☆20Feb 16, 2021Updated 5 years ago
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- Quick OSINT checks for IPs and Domains during triage and investigations.☆31Jun 26, 2024Updated last year
- A User Impersonation tool - via Token or Shellcode injection☆421May 21, 2022Updated 3 years ago
- Exploit for HiveNightmare - CVE-2021–36934☆61Aug 22, 2025Updated 6 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Azure AD cheatsheet for the CARTP course☆148May 5, 2022Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,874Aug 18, 2023Updated 2 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆186Jul 21, 2022Updated 3 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆83May 23, 2022Updated 3 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆275May 3, 2023Updated 2 years ago
- Zipper, a CobaltStrike file and folder compression utility.☆222Jan 18, 2020Updated 6 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆147Sep 8, 2022Updated 3 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Jun 2, 2022Updated 3 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- Maximizing BloodHound. Max is a good boy.☆532Apr 25, 2025Updated 10 months ago
- New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.☆301Feb 23, 2022Updated 4 years ago