shell-dot / tuoni
Tuoni
☆92Updated 2 weeks ago
Alternatives and similar repositories for tuoni:
Users that are interested in tuoni are comparing it to the libraries listed below
- Retired TrustedSec Capabilities☆246Updated 4 months ago
- Malware As A Service☆132Updated last year
- Make everyone in your VLAN ASRep roastable☆186Updated last month
- ☆190Updated 6 months ago
- ☆142Updated 3 weeks ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆149Updated 2 years ago
- Find potential DLL Sideloads on your windows computer☆200Updated 3 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆148Updated 5 months ago
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 2 years ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆151Updated 3 months ago
- winPEAS, but for Active Directory☆149Updated 2 weeks ago
- A cheatsheet for NetExec☆115Updated 2 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆185Updated last month
- Timeroasting scripts by Tom Tervoort☆281Updated last year
- ☆103Updated last year
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆62Updated 4 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆100Updated last month
- Some scripts to abuse kerberos using Powershell☆328Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆137Updated 3 weeks ago
- Python utility that generates "imageless" QR codes in various formats☆115Updated 8 months ago
- ☆139Updated 8 months ago
- ☆298Updated 5 months ago
- Azure Post Exploitation Framework☆196Updated last month
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Azure AD cheatsheet for the CARTP course☆111Updated 2 years ago
- ☆178Updated 4 months ago
- Custom Queries - Brought Up to BH4.1 syntax☆251Updated 5 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆183Updated last week
- A tool to query for the existence of pre-windows 2000 computer objects.☆319Updated last month
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆342Updated 4 months ago