synacktiv / Prox-Ez
☆64Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Prox-Ez
- ☆83Updated 2 years ago
- ☆68Updated last year
- ☆33Updated 3 weeks ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆96Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆130Updated last month
- Get Fine Grained Password Policy☆65Updated 6 months ago
- ZSH integration for Impacket☆58Updated last week
- Some scripts to support with importing large datasets into BloodHound☆76Updated 11 months ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆45Updated 2 years ago
- Exchangelib wrapper for pentesting☆56Updated 5 months ago
- Secretsdump C# version only supporting local (live) operation☆47Updated last year
- A Python based ingestor for BloodHound☆81Updated 2 years ago
- Random☆32Updated last year
- Convert an LDIF file to JSON files ingestible by BloodHound☆38Updated last month
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆62Updated 6 months ago
- Convert ldapdomaindump to Bloodhound☆76Updated 10 months ago
- ☆35Updated 3 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 7 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆85Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆68Updated last year
- ☆20Updated 2 years ago
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆28Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆82Updated last year
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆31Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆17Updated 3 years ago
- ☆112Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆36Updated 6 months ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆79Updated 6 months ago