outflanknl / Training-MSOfficeOffensiveTradecraft
Info related to the Outflank training: Microsoft Office Offensive Tradecraft
☆51Updated 10 months ago
Alternatives and similar repositories for Training-MSOfficeOffensiveTradecraft:
Users that are interested in Training-MSOfficeOffensiveTradecraft are comparing it to the libraries listed below
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- Scripts to interact with Microsoft Graph APIs☆35Updated 4 months ago
- ☆48Updated 4 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 9 months ago
- Python module for running BOFs☆70Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 8 months ago
- Living Off the Foreign Land setup scripts☆65Updated 3 weeks ago
- Python3 rewrite of AsOutsider features of AADInternals☆43Updated 3 months ago
- ☆71Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆78Updated 2 years ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆27Updated 3 months ago
- Lifetime AMSI bypass.☆35Updated 8 months ago
- ☆43Updated 8 months ago
- ☆58Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- ☆56Updated 3 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 6 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year