shell-dot / tuoni
Tuoni
☆57Updated this week
Related projects ⓘ
Alternatives and complementary repositories for tuoni
- ☆120Updated 4 months ago
- Malware As A Service☆119Updated 8 months ago
- ☆180Updated last month
- Make everyone in your VLAN ASRep roastable☆135Updated 4 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆130Updated 3 months ago
- Custom Queries - Brought Up to BH4.1 syntax☆228Updated 2 weeks ago
- Identifies the bytes that Microsoft Defender flags on.☆75Updated 2 years ago
- Retired TrustedSec Capabilities☆225Updated last month
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆196Updated 10 months ago
- ☆293Updated last week
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆105Updated this week
- Azure AD cheatsheet for the CARTP course☆96Updated 2 years ago
- pysnaffler☆85Updated 2 months ago
- Some scripts to abuse kerberos using Powershell☆312Updated last year
- Python utility that generates "imageless" QR codes in various formats☆99Updated 3 months ago
- Modular Enumeration and Password Spraying Framework☆109Updated 6 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆95Updated last year
- A Red Team Activity Hub☆171Updated this week
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆143Updated 2 years ago
- Generate graphs and charts based on password cracking result☆153Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆68Updated last year
- ☆275Updated last week
- Inject remote template link into word document for remote template injection☆159Updated 3 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆188Updated last month
- ☆24Updated last year
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆130Updated last year
- A tool for pointesters to find candies in SharePoint☆237Updated 2 years ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆174Updated 6 months ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆108Updated 4 years ago