ADE – ActiveDirectoryEnum usage: activeDirectoryEnum [-h] [-o OUT_FILE] [-u USER] [-s] [-smb] [-kp] [-bh] [-spn] [–all] [–no-creds] dc ___ __…
ADE – ActiveDirectoryEnum usage: activeDirectoryEnum [-h] [-o OUT_FILE] [-u USER] [-s] [-smb] [-kp] [-bh] [-spn] [–all] [–no-creds] dc ___ __…
Abusing Kerberos Resource-Based Constrained Delegation TL;DRThis repo is about a practical attack against Kerberos Resource-Based Constrained Delegation in a Windows…
Recently, Palo Alto Networks (PAN) issues a security bulletin, disclosing a serious vulnerability numbered CVE-2020-2040 with a CVSS score of…
OWASP SecureTea The OWASP SecureTea Project provides a one-stop security solution for various devices (personal computers/servers / IoT devices). This…
The Microsoft Mail application, Outlook comes with contacts and calendar functions so that users can record mail arrangements to the…
analyzer Offline Threat Intelligence Analyzer for extracting artifacts and IoCs from file/dump into a readable format General Features Runs locally…