shellinvictus / GriffonADLinks
Generate low-level commands to exploit the AD easily: learn and control every steps.
☆60Updated this week
Alternatives and similar repositories for GriffonAD
Users that are interested in GriffonAD are comparing it to the libraries listed below
Sorting:
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆213Updated 3 weeks ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆276Updated 3 weeks ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆385Updated 5 months ago
- Reaping treasures from strings in remote processes memory☆285Updated 11 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆354Updated 3 weeks ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆323Updated 2 weeks ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆111Updated 5 months ago
- ☆163Updated 2 months ago
- A visual methodology tracking platform tailored for offensive security assessments☆237Updated 4 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆264Updated 9 months ago
- Group Policy Objects manipulation and exploitation framework☆288Updated 2 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆350Updated 5 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆44Updated 9 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆264Updated 8 months ago
- ☆378Updated 3 months ago
- Windows protocol library, including SMB and RPC implementations, among others.☆609Updated 2 weeks ago
- Aliasr is a modern, feature-rich TUI launcher for penetration testing commands inspired by Arsenal, but with significantly improved funct…☆88Updated last week
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆290Updated 2 weeks ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆498Updated 4 months ago
- The different ways to dump lsass☆236Updated 5 months ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆260Updated last month
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆444Updated 3 weeks ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Updated 3 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆206Updated last year
- Impack-only implementation of WinRM protocol with support for NTLM and Kerberos auth☆117Updated 3 months ago
- Sliver CheatSheet for OSEP☆242Updated 2 months ago
- Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bo…☆505Updated last week
- Direct access to NTFS volumes☆292Updated 4 months ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆265Updated last month
- Living Off The Land API☆43Updated this week