epichoxha Goto Github PK
Name: epichoxha
Type: User
Bio: OSCP | OSEP | CRTO
Location: ::1
Name: epichoxha
Type: User
Bio: OSCP | OSEP | CRTO
Location: ::1
7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal
AADInternals PowerShell module for administering Azure AD and Office 365
Cobalt Strike UDRL for memory scanner evasion.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Active Directory Cheat Sheet
ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping to NDJSON.
ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.
Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources
Aggressor scripts for use with Cobalt Strike 3.0+
A collection of useful aggressor scripts. All credits due to its authors.
x64 binary obfuscator
Alternative Shellcode Execution Via Callbacks
This repo contains some Amsi Bypass methods i found on different Blog Posts.
THIS REPO IS PART OF WHAT ORCA TOLD ME TO UPLOAD
".ashx" Web Shell
Fileless atexec, no more need for port 445
Automated .NET AppDomain hijack payload generation
Active Directory & Red-Team Cheat-Sheet in constant expansion.
Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.
Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved) position.
This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated or detected.
Collection of BloodHound queries for Azure
From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
Kerberoasting/Asreproasting in Go
It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)
BloodHound Attack Research Kit
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.