Raghvendra Mishra's repositories
tpotce
🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
RemoteKrbRelay
Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
ntlm_theft
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
diagrams
This for diagrams which is being made for blogs
awesome-chatgpt-prompts
This repo includes ChatGPT prompt curation to use ChatGPT better.
enum4linux-ng
A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for security professionals and CTF players.
Timeroast
Timeroasting scripts by Tom Tervoort
RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
CVE-2023-34362
MOVEit CVE-2023-34362
Havoc
The Havoc Framework.
SessionGopher
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
evilgophish
evilginx2 + gophish
machine_learning_security
Source code about machine learning and security.
SharpCollection
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
GOAD
game of active directory
OffensiveNim
My experiments in weaponizing Nim (https://nim-lang.org/)
CVE-2022-26809-RCE
CVE-2022-26809-RCE-EXP
DSInternals
Directory Services Internals (DSInternals) PowerShell Module and Framework
Red-Teaming-Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
caldera
Automated Adversary Emulation Platform
WindowsExploitationResources
Resources for Windows exploit development
Whisker
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
NetNTLMtoSilverTicket
SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket
car
Cyber Analytics Repository
packetStrider
A network packet forensics tool for SSH