zerobs-rvn / hrafnaLinks
Log4j-Scanner with Bind-Receipt and custom hostnames
☆18Updated 3 years ago
Alternatives and similar repositories for hrafna
Users that are interested in hrafna are comparing it to the libraries listed below
Sorting:
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- Python Script for SAML2 Authentication Passwordspray☆42Updated 2 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆23Updated 2 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- Exactly what it sounds like, which is something rad☆23Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 5 years ago
- basic proxy as an azure function serverless app☆18Updated 2 years ago
- ☆18Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- A mini project to exfiltrate data via QR codes☆19Updated last week
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆37Updated 3 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 3 years ago
- Random scripts for azure stuff☆12Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆25Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- AMSI detection PoC☆31Updated 5 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated last week
- ☆42Updated 8 months ago
- Tricard - Malware Sandbox Fingerprinting☆22Updated 2 years ago
- ☆18Updated 2 years ago
- ☆31Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago