Pinned Repositories
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
AzTokenFinder
Azure-Red-Team
Azure Security Resources and Notes
AzureHound
Azure Data Exporter for BloodHound
AzureHound-legacy
AzurePrivilegedIAM
Docs and samples for privileged identity and access management in Microsoft Azure and Microsoft Entra.
BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
BloodHound
Six Degrees of Domain Admin
Lability
Virtual Engine test lab deployment and configuration module
lbrauns's Repositories
lbrauns/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
lbrauns/AzTokenFinder
lbrauns/Azure-Red-Team
Azure Security Resources and Notes
lbrauns/AzureHound
Azure Data Exporter for BloodHound
lbrauns/AzurePrivilegedIAM
Docs and samples for privileged identity and access management in Microsoft Azure and Microsoft Entra.
lbrauns/Benchy-tugboat
This is the Code for my Benchy Tugboat. You have to change the Mac Adress of the Esp8266 in the reciever and transmitter Code, to fit your Microcontroller
lbrauns/BloodHound
Six Degrees of Domain Admin
lbrauns/BloodHound-Tools
Miscellaneous tools for BloodHound
lbrauns/BypassCredGuard
Credential Guard Bypass Via Patching Wdigest Memory
lbrauns/Lability
Virtual Engine test lab deployment and configuration module
lbrauns/BloodHoundCE
Six Degrees of Domain Admin
lbrauns/Coercer
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
lbrauns/CVE-2021-1675
Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)
lbrauns/CypherDog
PoSh BloodHound Dog Whisperer
lbrauns/DSInternals
Directory Services Internals (DSInternals) PowerShell Module and Framework
lbrauns/ImproHound
Identify the attack paths in BloodHound breaking your AD tiering
lbrauns/maester
The core repository for the Maester module with helper cmdlets that will be called from the Pester tests.
lbrauns/Microsoft-eventlog-mindmap
Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...
lbrauns/Microsoft365DSC
Manages, configures, extracts and monitors Microsoft 365 tenant configurations
lbrauns/mimikatz
A little tool to play with Windows security
lbrauns/monkey365
Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Azure Active Directory security configuration reviews.
lbrauns/ntlmv1-multi
NTLMv1 Multitool
lbrauns/ROADtools
The Azure AD exploration framework.
lbrauns/Seatbelt
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
lbrauns/SharpHound3
C# Data Collector for the BloodHound Project, Version 3
lbrauns/SharpHoundCommon
Common library used by SharpHound.
lbrauns/SharpUp
SharpUp is a C# port of various PowerUp functionality.
lbrauns/Stormspotter
Azure Red Team tool for graphing Azure and Azure Active Directory objects
lbrauns/Tier0-User-Management
Maintain Tier 0 users. This script take care all Tier 0 users are in the correct OU or in the default user container and add the Kerberos Authentication policy to the user
lbrauns/TierZeroTable
Table of AD and Azure assets and whether they belong to Tier Zero