xpn / malIDP
☆12Updated last year
Alternatives and similar repositories for malIDP:
Users that are interested in malIDP are comparing it to the libraries listed below
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆13Updated 5 years ago
- Nemesis agent for Mythic☆27Updated 7 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated 11 months ago
- Scripts that automate portions of pentests.☆28Updated this week
- Extract registry and NTDS secrets from local or remote disk images☆37Updated 3 weeks ago
- Scripts to interact with Microsoft Graph APIs☆36Updated 4 months ago
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- ☆30Updated 2 years ago
- ☆16Updated last year
- ☆15Updated last year
- Ansible role that Installs Mythic☆14Updated 9 months ago
- ☆17Updated 4 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆30Updated 3 weeks ago
- Modified version of PEAS client for offensive operations☆40Updated 2 years ago
- ☆11Updated last month
- ☆47Updated 2 years ago
- Linux CS bypass technique☆30Updated 2 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated this week
- ☆21Updated last month
- ☆16Updated 5 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 10 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 6 months ago
- Find Inbound Email Domains☆22Updated last year
- Discord C2 Profile for Mythic☆28Updated last month
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- ☆12Updated 2 years ago
- ☆2Updated 3 months ago