Raghvendra Mishra's repositories
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
awesome-chatgpt-prompts
This repo includes ChatGPT prompt curation to use ChatGPT better.
BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
caldera
Automated Adversary Emulation Platform
car
Cyber Analytics Repository
CVE-2022-26809-RCE
CVE-2022-26809-RCE-EXP
CVE-2023-34362
MOVEit CVE-2023-34362
DSInternals
Directory Services Internals (DSInternals) PowerShell Module and Framework
evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
enum4linux-ng
A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for security professionals and CTF players.
evilgophish
evilginx2 + gophish
EvilOSX
An evil RAT (Remote Administration Tool) for macOS / OS X.
exploitDev.github.io
Basic Exploit Development for OSCP Preparation
GOAD
game of active directory
Havoc
The Havoc Framework.
machine_learning_security
Source code about machine learning and security.
NetNTLMtoSilverTicket
SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket
ntlm_theft
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
OffensiveNim
My experiments in weaponizing Nim (https://nim-lang.org/)
packetStrider
A network packet forensics tool for SSH
Red-Teaming-Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
SessionGopher
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
SharpCollection
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
Timeroast
Timeroasting scripts by Tom Tervoort
Whisker
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
WindowsExploitationResources
Resources for Windows exploit development