ralphte / arm-yourself-talk
How to ARM Yourself - Bsides Tampa 2020
☆14Updated 5 years ago
Alternatives and similar repositories for arm-yourself-talk:
Users that are interested in arm-yourself-talk are comparing it to the libraries listed below
- TA505+ Adversary Simulation☆65Updated 4 years ago
- ☆41Updated 5 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated this week
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆39Updated 4 years ago
- ☆77Updated 5 years ago
- ☆20Updated 4 years ago
- ☆69Updated 3 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated 7 months ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- ☆73Updated 3 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- ☆76Updated 6 years ago
- Helps with finding and registering categorized domains☆67Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 3 years ago
- A repo to support the book☆106Updated 3 years ago
- ☆55Updated 4 years ago
- ☆28Updated 4 years ago
- Active Directory Purple Team Playbook☆105Updated last year
- ☆46Updated 2 months ago
- Defensive Origins Training Schedule☆38Updated last year
- Terraform project to build AWS instances for pivot practice☆10Updated last year
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆102Updated 2 years ago
- Merges multiple .nessus files into one file.☆44Updated 2 years ago
- All my slides for any talks☆23Updated 4 months ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Updated 6 years ago
- ☆15Updated 6 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Updated 5 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆107Updated 3 months ago
- ☆12Updated 3 months ago
- ☆36Updated 7 months ago