Security Assessment Report geNerated Automatically
☆41Sep 26, 2024Updated last year
Alternatives and similar repositories for sarna
Users that are interested in sarna are comparing it to the libraries listed below
Sorting:
- ☆14Oct 25, 2019Updated 6 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- A productivity burp extension which reminds to take break while you are at work!☆18May 31, 2020Updated 5 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- ☆11Jan 28, 2025Updated last year
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- Hackers Don't Give A Shit☆16Feb 2, 2020Updated 6 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- Extract domains/subdomains/FQDNs from files and URLs☆19Jun 30, 2020Updated 5 years ago
- The Cloud Blocker☆108Feb 16, 2025Updated last year
- A WLAN red team framework.☆156Feb 9, 2026Updated 3 weeks ago
- MSTSC Packet Dump Utility☆30Feb 11, 2022Updated 4 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- PE Crypter written in Nim☆101Mar 25, 2021Updated 4 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆392Mar 25, 2021Updated 4 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- Bicep examples repo for log analytics, azure monitor and sentinel☆26Mar 16, 2023Updated 2 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- Retrieve LAPS password from LDAP☆435Feb 17, 2021Updated 5 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- Lure - User Recon Automation for GoPhish☆165Jul 30, 2023Updated 2 years ago
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆65May 13, 2021Updated 4 years ago