praetorian-inc / Okta_Watering_HoleView external linksLinks
Next Generation Phishing Tool For Internal / Red Teams
☆35Jun 4, 2019Updated 6 years ago
Alternatives and similar repositories for Okta_Watering_Hole
Users that are interested in Okta_Watering_Hole are comparing it to the libraries listed below
Sorting:
- Terraform script to deploy AD-based environment on Azure☆41Apr 22, 2023Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 5 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- ☆35Jan 27, 2023Updated 3 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 8 years ago
- ☆14Jun 7, 2017Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆174Oct 11, 2017Updated 8 years ago
- Aggressor scripts for Cobalt Strike☆61Dec 9, 2019Updated 6 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆19Jun 16, 2019Updated 6 years ago
- ☆12Jan 16, 2018Updated 8 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- Git Repo and Filesystem credential scanner☆18Sep 8, 2017Updated 8 years ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- An attempt to automated hunting for delegation access across the domain☆27Jan 17, 2019Updated 7 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 9 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆67Oct 3, 2020Updated 5 years ago
- ☆37May 8, 2022Updated 3 years ago