Name: Kent Ickler
Type: User
Company: Black Hills Information Security | Defensive Origins
Bio: @blackhillsinfosec - Security Analyst, Penetration Tester; Red/Blue Team; Administrator
@DefensiveOrigins - Co-Founder
Twitter: Krelkci
Location: Black Hills, South Dakota
Blog: https://www.defensiveorigins.com
Kent Ickler's Projects
Burp Suite extension to discover assets from HTTP response.
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana
Custom Query list for the Bloodhound GUI based off my cheatsheet
Cloudflare Worker to Inject Headers into HTTP Responses
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
Build a domain with three quick PowerShell scripts!
Domain Password Audit Tool for Pentesters
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
Fail2Ban Distributed Bans via SSHFS
HomeAssistant custom integration for SmartThinQ LG devices configurable with Lovelace User Interface.
WIFI configuration and ONVIF information for Nightowl WNIP2 series cameras
mirror of http://sourceforge.net/projects/onvifdm/
Zabbix Template for pfSense
PGP Key for Kent Ickler
Pipal, THE password analyser
Bloodhound for Blue and Purple Teams
PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and Bing searches. It then allows for the download of those files from the target domain. After retrieving the files, the metadata associated with them can be analyzed by PowerMeta. Some interesting things commonly found in metadata are usernames, domains, software titles, and computer names.
Script to disable NetBios for TCP/IP on Network Interfaces
The Azure AD exploration framework.
.NET Project for Attacking vCenter
Concise, consistent, and legible badges in SVG and raster format
Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.
Hubitat integration for the Elgato Stream Deck
Somes tools and scripts