rj4yb3 / misc
☆11Updated 4 years ago
Related projects: ⓘ
- ☆85Updated this week
- Active Directory enumeration from non-domain system.☆116Updated 7 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆181Updated 4 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆102Updated 7 years ago
- A ton of helpful tools☆39Updated 2 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆161Updated 6 years ago
- ☆59Updated 5 years ago
- Materials of Workshop presented at DEFCON 25☆107Updated 7 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆116Updated 4 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆70Updated 7 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 3 months ago
- Misc. PowerShell scripts☆115Updated 8 years ago
- Shell script for converting an input file containing one or more sslscan results into HTML tables.☆13Updated 4 years ago
- Conveigh is a Windows PowerShell LLMNR/NBNS spoofer detection tool☆91Updated 8 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆36Updated 6 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 6 years ago
- Python Tool for Host Enumeration☆50Updated 7 years ago
- ☆28Updated 2 years ago
- Some PowerShell Defensive Scripts☆126Updated 8 years ago
- Useful Threat Hunting Stuff☆31Updated 4 years ago
- ☆97Updated 8 years ago
- ☆79Updated this week
- ☆13Updated this week
- Obfuscated Penetration Testing PowerShell scripts☆131Updated 8 years ago
- ☆52Updated this week
- ☆108Updated 7 years ago
- IR-Tools - PowerShell tools for IR☆128Updated 7 years ago
- The documents☆55Updated 6 years ago
- Implementing Kerberoast attack fully in python☆72Updated 5 years ago