Jonas Bülow Knudsen's repositories
ImproHound
Identify the attack paths in BloodHound breaking your AD tiering
RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
ATmega16-AES
Fast implementation of AES encryption for a ATmega16 microcontroller
BARK
BloodHound Attack Research Kit
block-cipher-attacks
Attacks on block ciphers implemented in Java.
BloodHound
Six Degrees of Domain Admin
BloodHound-1
Six Degrees of Domain Admin
hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
juicy-potato
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
SharpHound
C# Data Collector for BloodHound
SharpHoundCommon
Common library used by SharpHound.
ThreatCheck
Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
Veil-PowerView
Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.
windows-itpro-docs
This is used for contributions to the Windows 10 content for IT professionals on docs.microsoft.com.