trustedsec / User-Behavior-Mapping-ToolLinks
☆164Updated last year
Alternatives and similar repositories for User-Behavior-Mapping-Tool
Users that are interested in User-Behavior-Mapping-Tool are comparing it to the libraries listed below
Sorting:
- Finding all things on-prem Microsoft for password spraying and enumeration.☆255Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆151Updated 2 years ago
- SpecterOps Presentations☆200Updated 3 weeks ago
- A tool for pointesters to find candies in SharePoint☆257Updated 2 years ago
- User enumeration with Microsoft Teams API☆172Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆320Updated 2 years ago
- ☆144Updated 2 months ago
- ☆190Updated 2 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated last month
- Material for the "Hands-On BloodHound" Workshop☆108Updated 4 years ago
- ☆139Updated last year
- ☆208Updated 3 years ago
- Modular Enumeration and Password Spraying Framework☆118Updated last year
- Collection of tools to use with Azure Applications☆108Updated last year
- ☆109Updated 4 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆196Updated 3 weeks ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆70Updated 5 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆94Updated last year
- Azure AD cheatsheet for the CARTP course☆116Updated 3 years ago
- ☆151Updated 3 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆389Updated last year
- ☆247Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 3 years ago
- Tool to extract powerful tokens from Office desktop apps memory☆71Updated last year
- ☆99Updated 3 years ago
- GolenGMSA tool for working with GMSA passwords☆150Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆86Updated 3 years ago
- ☆98Updated 7 months ago
- ☆178Updated 6 months ago