1njected / CMLootLinks
Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares
☆181Updated 2 years ago
Alternatives and similar repositories for CMLoot
Users that are interested in CMLoot are comparing it to the libraries listed below
Sorting:
- ☆155Updated 7 months ago
- ☆193Updated last month
- Some scripts to support with importing large datasets into BloodHound☆81Updated last year
- ☆119Updated 6 months ago
- Cortex XDR Config Extractor☆134Updated 2 years ago
- ☆70Updated 8 months ago
- pysnaffler☆104Updated last month
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆175Updated last month
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆177Updated 2 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆140Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆128Updated 3 years ago
- A Python POC for CRED1 over SOCKS5☆158Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆98Updated last year
- ☆212Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆95Updated 2 years ago
- OPSEC safe Kerberoasting in C#☆192Updated 3 years ago
- ☆222Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆44Updated 2 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆160Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258Updated 2 years ago
- GolenGMSA tool for working with GMSA passwords☆162Updated last month
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆122Updated 3 years ago
- Buggy script to play with GPOs☆115Updated 9 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆93Updated 2 years ago
- Malware As A Service☆135Updated last year
- ☆250Updated 2 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆267Updated 2 years ago
- Koppeling x Metatwin x LazySign☆215Updated 4 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆53Updated last year