referefref / canarytokendetectorLinks
Detect and remove the presence of canary tokens
☆22Updated last year
Alternatives and similar repositories for canarytokendetector
Users that are interested in canarytokendetector are comparing it to the libraries listed below
Sorting:
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Updated last year
- self-hosted Azure OSINT tool☆31Updated 2 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated 2 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆20Updated 3 weeks ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- ☆15Updated 2 years ago
- urlyzer is a URL parsing analysis tool.☆23Updated last year
- Tool to perform lateral movement between AAD joined devices☆64Updated 3 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated last year
- A user enumeration tool for Slack.☆31Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆26Updated 3 years ago
- ☆54Updated 9 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- fully async implementation of Dirkjan's ROADTools☆32Updated 6 months ago
- Nemesis agent for Mythic☆27Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- Files to automatically deploy red team Active Directory test lab☆47Updated 3 years ago
- Configurable, Community driven, HTTP C2 Profile☆26Updated 3 months ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- create a "simulated internet" cyber range environment☆18Updated 3 months ago
- tool for identifying guest relationships between companies☆102Updated last year
- Repository for LNK stuff☆31Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated last year
- Ansible role that Installs Mythic☆18Updated last year
- WMI SA stuffs☆30Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆39Updated last year
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆50Updated last year