trustedsec / User-Behavior-Mapping-ToolLinks
☆165Updated 2 years ago
Alternatives and similar repositories for User-Behavior-Mapping-Tool
Users that are interested in User-Behavior-Mapping-Tool are comparing it to the libraries listed below
Sorting:
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257Updated 3 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆259Updated 3 years ago
- SpecterOps Presentations☆206Updated 2 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 8 months ago
- ☆115Updated 4 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆322Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆95Updated last month
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆157Updated 2 years ago
- ☆209Updated 3 years ago
- User enumeration with Microsoft Teams API☆173Updated 4 years ago
- ☆190Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆59Updated 10 years ago
- ☆140Updated last year
- Material for the "Hands-On BloodHound" Workshop☆109Updated 4 years ago
- DNS Tunneling using powershell to download and execute a payload. Works in CLM.☆229Updated 3 years ago
- Tool to extract powerful tokens from Office desktop apps memory☆71Updated last year
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 3 years ago
- ☆100Updated 10 months ago
- A tool for pointesters to find candies in SharePoint☆262Updated 2 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated 4 months ago
- Collection of tools to use with Azure Applications☆109Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆220Updated 3 years ago
- InfoSec Notes☆57Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆97Updated 2 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆115Updated last year
- ☆100Updated 3 years ago
- ☆105Updated last year
- ☆179Updated 8 months ago
- Identifies the bytes that Microsoft Defender flags on.☆89Updated 3 years ago