Bunch of honey related items that spoof/decoy powersploit functions.
☆18Apr 23, 2020Updated 5 years ago
Alternatives and similar repositories for Decoy-sploit
Users that are interested in Decoy-sploit are comparing it to the libraries listed below
Sorting:
- Purple Team Security☆76Mar 24, 2022Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- ☆15Oct 29, 2024Updated last year
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- ☆20Feb 6, 2024Updated 2 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Apr 22, 2019Updated 6 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- ☆57May 13, 2020Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- Just another AD training, but free.☆15Aug 9, 2025Updated 6 months ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Simple tmux session management.☆16Dec 16, 2023Updated 2 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 8 months ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Microsoft External Attack Tool☆178Dec 8, 2022Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- ☆17May 17, 2023Updated 2 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- Our fork of Iceman's fork for Proxmark III☆18Dec 14, 2024Updated last year