Skip to content
View Pri3st's full-sized avatar
🔱
Phishing
🔱
Phishing

Highlights

  • Pro

Block or report Pri3st

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Pri3st/README.md

🩸 Sip, Puff, Secure 🩸

Forgive me for not understanding what the 💻 and 🔢 are saying.

363882650-f1465943-4960-4ecd-8a55-cdbf9221f04b

  • 🔱 Security Dilettante
  • ♟ Military Officer
  • ⛈️ Currently doing cloud stuff
  • 🍻 Looking to collaborate on AD and cloud-related projects

Stats & other boring stuff

Pri3st's Stats

Pri3st's Top Languages

🛠️ Contributions
Project Project Short Description Contribution
BloodHoundCE BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment. Improvements in ACL/ACE Abuses Documentation
adPEAS adPEAS is a Powershell tool to automate Active Directory enumeration. Updated the SharpHound Ingestor to match that of BloodHoundCE
The Hacker Recipes This project is aimed at freely providing technical guides on various hacking topics. Various commits related to Cross-Domain/Cross-Forest/bastion Forest Attacks, DNA enumeration on AD and WebClient abuses
SecLists SecLists is a collection of multiple types of lists used during security assessments, collected in one place. Added a wordlist with commonly used rotated passwords on enterprise environments
AzSubEnum AzSubEnum is a specialized subdomain enumeration tool tailored for Azure services. Added enhanced recon capabilities related to Blob Containers that allow Anonymous Access and publicly accessible Blobs
Internal All The Things Active Directory and Internal Pentest Cheatsheets Updated the Network Pivoting Techniques to include instructions for ligolo-ng
TokenTacticsV2 TokenTacticsV2 is used to simplify or automate the process of acquiring access tokens for different Azure resources for offensive operations. Added functionality to acquire Access Tokens for Azure Storage and Key Vault resources using Refresh Tokens

Popular repositories Loading

  1. Azure-Scripts Azure-Scripts Public

    A highly unorganized repo with PowerShell (and more) scripts, diagrams and other stuff for Azure enumeration and exploitation

    PowerShell 2

  2. ASDF-Hotel-Database ASDF-Hotel-Database Public archive

    Hotel Database Project for the Undergraduate "Databases" Course in ECE/NTUA.

    PHP 1

  3. InternalAllTheThings InternalAllTheThings Public

    Forked from swisskyrepo/InternalAllTheThings

    Active Directory and Internal Pentest Cheatsheets

    HTML 1

  4. AzSubEnumV2 AzSubEnumV2 Public

    Forked from yuyudhn/AzSubEnum

    Azure Service Subdomain Enumeration with Enhanced Recon Capabilities

    Python 1

  5. Skyscanner-Cheapest-Flights Skyscanner-Cheapest-Flights Public archive

    In this project, the web service mines data from the Skyscanner Flight Search API (https://rapidapi.com/skyscanner/api/skyscanner-flight-search/) and return the desired results. The user will input…

    TypeScript

  6. Exploit-Scripts Exploit-Scripts Public

    Python