- 🔱 Security Dilettante
- ♟ Military Officer
- ⛈️ Currently doing cloud stuff
- 🍻 Looking to collaborate on AD and cloud-related projects
🛠️ Contributions
Project | Project Short Description | Contribution |
---|---|---|
BloodHoundCE | BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment. | Improvements in ACL/ACE Abuses Documentation |
adPEAS | adPEAS is a Powershell tool to automate Active Directory enumeration. | Updated the SharpHound Ingestor to match that of BloodHoundCE |
The Hacker Recipes | This project is aimed at freely providing technical guides on various hacking topics. | Various commits related to Cross-Domain/Cross-Forest/bastion Forest Attacks, DNA enumeration on AD and WebClient abuses |
SecLists | SecLists is a collection of multiple types of lists used during security assessments, collected in one place. | Added a wordlist with commonly used rotated passwords on enterprise environments |
AzSubEnum | AzSubEnum is a specialized subdomain enumeration tool tailored for Azure services. | Added enhanced recon capabilities related to Blob Containers that allow Anonymous Access and publicly accessible Blobs |
Internal All The Things | Active Directory and Internal Pentest Cheatsheets | Updated the Network Pivoting Techniques to include instructions for ligolo-ng |
TokenTacticsV2 | TokenTacticsV2 is used to simplify or automate the process of acquiring access tokens for different Azure resources for offensive operations. | Added functionality to acquire Access Tokens for Azure Storage and Key Vault resources using Refresh Tokens |