Lists (10)
Sort Oldest
Starred repositories
Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all DPAPI blob of all users from all computers and uses Domain ba…
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidel…
Unofficial mirror of FernFlower Java decompiler (All pulls should be submitted upstream)
Official Kali Linux tool to check all urls of a domain for SQL injections :)
A SimpleHTTPServer written in Go, enhanced with features and with a nice design - https://goshs.de
Tool for Active Directory Certificate Services enumeration and abuse
Adversary Tactics - PowerShell Training
VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios
pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examp…
Wordlists for creating statistically likely username lists for use in password attacks and security testing
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]
Apache Log4j 2 is a versatile, feature-rich, efficient logging API and backend for Java.
Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that I find useful during internal penetration tests and assumed breach exercises (red teaming)
OSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines
Automate the creation of a lab environment complete with security tooling and logging best practices
Active Directory Integrated DNS dumping by any authenticated user
Kerberos unconstrained delegation abuse toolkit
Attack and defend active directory using modern post exploitation adversary tradecraft activity
One rule to crack all passwords. or atleast we hope so.
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses