referefref / canarytokendetector
Detect and remove the presence of canary tokens
☆13Updated 9 months ago
Related projects: ⓘ
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆22Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆28Updated last year
- PAM Backdoor☆27Updated last year
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆38Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- Ansible role that Installs Mythic☆14Updated 2 months ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆37Updated 3 years ago
- Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend…☆35Updated last week
- ☆17Updated last year
- AutoPoC Generator HoneyPoC☆32Updated 2 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆34Updated 4 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆37Updated 2 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆24Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- My Python Cookiecutter project template☆29Updated 2 years ago
- ☆50Updated last year
- fully async implementation of Dirkjan's ROADTools☆31Updated 6 months ago
- sudo-parser is a tool to audit complex sudoers files☆17Updated last year
- Continuous kerberoast monitor☆43Updated last year
- Enumerate and check domains for Azure tenants☆44Updated 2 years ago
- ☆14Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆14Updated 2 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆30Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆29Updated last year
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆16Updated 3 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆26Updated 5 months ago
- Malicious Macro attack techniques for red teamers☆15Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago