quahac / Azure-AD-Password-Checker
Azure AD Password Checker
☆82Updated 6 months ago
Related projects: ⓘ
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆171Updated 2 years ago
- ☆76Updated last year
- Tool for efficient directory enumeration☆55Updated 3 months ago
- ☆34Updated 7 months ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆114Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆77Updated 9 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆117Updated 6 months ago
- Abuse Azure API permissions for red teaming☆55Updated last year
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆118Updated 2 years ago
- ☆40Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆136Updated 6 months ago
- Convert Cobalt Strike profiles to IIS web.config files☆109Updated 3 years ago
- Secretsdump C# version only supporting local (live) operation☆47Updated last year
- Lateral Movement☆117Updated 10 months ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Powershell version of SharpGPOAbuse☆68Updated 3 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆102Updated last year
- C# version of NTLMRawUnHide☆71Updated last year
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆59Updated last year
- ACL abuse swiss-knife☆116Updated last year
- To audit the security of read-only domain controllers☆112Updated 9 months ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆95Updated 2 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆75Updated last week
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆46Updated last year
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆145Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆74Updated 2 years ago
- ☆87Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆75Updated 9 months ago