thinkst / defending-off-the-landView external linksLinks
Assortment of scripts and tools for our Blackhat EU 2024 talk
☆104Feb 6, 2025Updated last year
Alternatives and similar repositories for defending-off-the-land
Users that are interested in defending-off-the-land are comparing it to the libraries listed below
Sorting:
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆117Sep 2, 2025Updated 5 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- Addon for BHCE☆58Apr 1, 2025Updated 10 months ago
- ☆23Mar 4, 2025Updated 11 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Jan 30, 2026Updated 2 weeks ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- Validates priv escalation of AD trusts☆48Apr 1, 2025Updated 10 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- ForsHops☆152Mar 25, 2025Updated 10 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 10 months ago
- ☆17Jan 9, 2025Updated last year
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 6 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆167Dec 7, 2025Updated 2 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 6 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Jul 13, 2025Updated 7 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆307Mar 31, 2025Updated 10 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Jun 10, 2025Updated 8 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆118Aug 9, 2024Updated last year
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 3 weeks ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- ☆53Feb 4, 2025Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 10 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆28Nov 26, 2025Updated 2 months ago
- ☆40Dec 24, 2025Updated last month
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 3 months ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 2 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆171Jan 9, 2026Updated last month
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 2 months ago
- A python library to create BloodHound OpenGraphs☆52Feb 4, 2026Updated last week
- ☆163Nov 19, 2025Updated 2 months ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 6 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆376Jan 23, 2025Updated last year
- Persist like a Dodder☆67May 19, 2025Updated 8 months ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago
- reverse engineering random malwares☆22Feb 1, 2025Updated last year