techBrandon / DC32-GOAD
☆48Updated last month
Related projects: ⓘ
- Fully automated windows credentials dumper, from SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine wit…☆66Updated 3 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆119Updated last month
- MS Graph Commands and Tools for Blue Teamers☆47Updated 10 months ago
- ☆51Updated this week
- ☆22Updated last year
- ☆43Updated 7 months ago
- Tool to extract powerful tokens from Office desktop apps memory☆66Updated 6 months ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆74Updated 2 years ago
- ☆34Updated 6 months ago
- Automatically run and populate a new instance of BH CE☆41Updated 2 weeks ago
- DEFCON 31☆57Updated 2 months ago
- ☆21Updated this week
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆91Updated 3 weeks ago
- ☆46Updated 10 months ago
- ☆74Updated 3 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆142Updated 4 months ago
- BloodHound PowerShell client☆43Updated this week
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆27Updated 3 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 4 months ago
- ☆21Updated this week
- Parses Snaffler output file and generate beautified outputs.☆29Updated 3 weeks ago
- Default Detections for EDR☆94Updated 6 months ago
- ☆79Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆64Updated 2 weeks ago
- Enumerate Microsoft Entra ID (Azure AD) fast☆85Updated last month
- A Azure Exploitation Toolkit for Red Team & Pentesters☆146Updated last year
- create a "simulated internet" cyber range environment☆11Updated 2 months ago
- ☆34Updated 5 months ago
- ☆115Updated 2 weeks ago
- ☆146Updated 2 weeks ago