Thomas DIOT's repositories
OffensivePythonPipeline
Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, and Make.
FarsightAD
PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory domain compromise
InfoSec-Notes
InfoSec Notes
qazeer.github.io
Source code for qazeer.io
recon-ng-marketplace
Official module repository for the Recon-ng Framework.
artefacts.help
https://artefacts.help/
artifacts
Digital Forensics Artifact Repository
code-snippets
Various code snippets
bmc-tools-compiled
Compiled version of the bmc-tools.py Python script from ANSSI-FR's bmc-tools project
commando-vm
Complete Mandiant Offensive VM (Commando VM), the first full Windows-based penetration testing virtual machine distribution. The security community recognizes Kali Linux as the go-to penetration testing platform for those that prefer Linux. Commando VM is for penetration testers that prefer Windows. We know that building a Windows penetration testing environment can be tedious - we aim to streamline and simplify this process. Commando VM includes over 140 tools.
KapeFiles
This repository serves as a place for community created Targets and Modules for use with KAPE.
MemProcFS
MemProcFS
metasploit-framework
Metasploit Framework
Microsoft-Extractor-Suite
A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.
mplog_parser-compiled
Compiled version of the Python script from Intrinsec mplog_parser project
packer-windows
Windows Packer Templates
pingcastle
PingCastle - Get Active Directory Security at 80% in 20% of the time
Priv2Admin
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
velociraptor-docs
Documentation site for Velociraptor
Whisker
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.