werdhaihai / AtlasReaper
A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.
☆256Updated last year
Alternatives and similar repositories for AtlasReaper
Users that are interested in AtlasReaper are comparing it to the libraries listed below
Sorting:
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆301Updated 6 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆211Updated last week
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆173Updated 8 months ago
- ☆159Updated 6 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆211Updated 4 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆256Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆329Updated last year
- ☆182Updated 5 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆236Updated last year
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆170Updated 3 weeks ago
- OPSEC safe Kerberoasting in C#☆191Updated 2 years ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆235Updated 4 months ago
- ☆151Updated 3 months ago
- ☆202Updated last year
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆386Updated last month
- ☆220Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆175Updated 2 years ago
- Custom Queries - Brought Up to BH4.1 syntax☆252Updated 2 weeks ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Use ESC1 to perform a makeshift DCSync and dump hashes☆207Updated last year
- ☆157Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆199Updated 6 months ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆197Updated 10 months ago
- ☆299Updated 6 months ago
- ☆143Updated last month
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆231Updated last year
- ☆117Updated last month
- ☆277Updated last year
- Find potential DLL Sideloads on your windows computer☆203Updated 4 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆174Updated 2 years ago