diff --git a/Offensive.md b/Offensive.md index 808ca3a..8fbfc74 100644 --- a/Offensive.md +++ b/Offensive.md @@ -2014,6 +2014,10 @@ Some tools can be categorized in more than one category. But because the current FuzzySecurity/StandIn StandIn is a small .NET35/45 AD post-exploitation toolkit + + Hackplayers/evil-winrm + The ultimate WinRM shell for hacking/pentesting + improsec/ImproHound Identify the attack paths in BloodHound breaking your AD tiering