puzzlepeaches / sneaky_proxy
Hiding your infrastructure from the boys in blue.
☆20Updated 3 years ago
Alternatives and similar repositories for sneaky_proxy:
Users that are interested in sneaky_proxy are comparing it to the libraries listed below
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50Updated 2 years ago
- Modified version of PEAS client for offensive operations☆39Updated 2 years ago
- Find Inbound Email Domains☆22Updated last year
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆17Updated 11 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 6 months ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆10Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆29Updated 3 years ago
- Exchangelib wrapper for pentesting☆60Updated last month
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- ☆12Updated 2 years ago
- ☆71Updated last year
- ☆31Updated 4 years ago
- Scripts to interact with Microsoft Graph APIs☆36Updated 4 months ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- ☆42Updated 2 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- Extract registry and NTDS secrets from local or remote disk images☆37Updated last week
- WhoAmI by asking the LDAP service on a domain controller.☆61Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- Get Fine Grained Password Policy☆68Updated 10 months ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- (kinda) Malicious Outlook Reader☆18Updated 4 years ago