ConstantinT's Stars
HavocFramework/Havoc
The Havoc Framework.
ihebski/DefaultCreds-cheat-sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
mgeeky/Penetration-Testing-Tools
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
Cloud-Architekt/AzureAD-Attack-Defense
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
0xsp-SRD/mortar
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
dafthack/MFASweep
A tool for checking if MFA is enabled on multiple Microsoft Services
Flangvik/TeamFiltration
TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts
Kyuu-Ji/Awesome-Azure-Pentest
A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.
Accenture/Spartacus
Spartacus DLL/COM Hijacking Toolkit
daem0nc0re/TangledWinExec
PoCs and tools for investigation of Windows process execution techniques
mgeeky/PackMyPayload
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
antonioCoco/JuicyPotatoNG
Another Windows Local Privilege Escalation from Service Account to System
assume-breach/Home-Grown-Red-Team
NetSPI/PowerHuntShares
PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains.
Accenture/Codecepticon
.NET/PowerShell/VBA Offensive Security Obfuscator
idnahacks/GoodHound
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
Dec0ne/ShadowSpray
A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other objects in the domain.
fin3ss3g0d/cypherhound
Python3 terminal application that contains 405 Neo4j cyphers for BloodHound data sets and 388 GUI cyphers
Z4kSec/Masky
Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory
CCob/Volumiser
projectkudu/ARMClient
A simple command line tool to invoke the Azure Resource Manager API
ironmansoftware/psmsi
Create MSIs using PowerShell.
microsoft/Intune-ACSC-Windows-Hardening-Guidelines
Collection of Intune policies that could assist with implementing ACSC's Windows hardening guidance.
Mr-Un1k0d3r/AMSI-ETW-Patch
Patch AMSI and ETW
JulianHayward/AzADServicePrincipalInsights
Insights and change tracking on Microsoft Entra ID Service Principals (Enterprise Applications, Applications and Managed Identities)
f-bader/TokenTacticsV2
A fork of the great TokenTactics with support for CAE and token endpoint v2
winsecurity/Offensive-C-Sharp
secureworks/TokenMan
olafhartong/MDE-AuditCheck
MDE relies on some of the Audit settings to be enabled
Harvester57/Security-ADMX
Custom ADMX template focused on hardening Windows 10 systems