skelsec / aesedb
async parser for JET
☆24Updated last year
Alternatives and similar repositories for aesedb
Users that are interested in aesedb are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Password spray wrapper for OpenConnect VPN client☆11Updated 4 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆49Updated 4 years ago
- c# reverse shell poc☆27Updated 6 years ago
- Caesar-Cipher based encryption☆30Updated 4 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆62Updated 3 years ago
- terraform deployment for red team☆22Updated 2 years ago
- Simple .NET assembly to interact with services.☆40Updated 5 years ago
- Ansible role that Installs Mythic☆15Updated 10 months ago
- ☆21Updated 4 years ago
- ☆39Updated 6 years ago
- ☆53Updated 4 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆34Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- ☆17Updated 4 years ago
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆47Updated 5 months ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆14Updated 5 years ago
- Exchangelib wrapper for pentesting☆64Updated 2 months ago
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- In 'n Out - See what goes in and comes out of PEs☆34Updated 3 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Updated 3 years ago
- Hiding your infrastructure from the boys in blue.☆20Updated 3 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 2 years ago