Use python to perform Kerberos pre-auth bruteforcing
☆210Apr 16, 2023Updated 3 years ago
Alternatives and similar repositories for pyKerbrute
Users that are interested in pyKerbrute are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Bypass Anti-virus Software Lateral Movement Command Execution Tool☆1,466Jan 20, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆38Oct 13, 2021Updated 4 years ago
- c# implementation of Active Directory Integrated DNS dumping (authenticated user)☆207May 25, 2021Updated 4 years ago
- SharpSQLTools 和@Rcoil一起写的小工具,可上传下载文件,xp_cmdshell与sp_oacreate执行命令回显和clr加载程序集执行相应操作。☆967Aug 5, 2021Updated 4 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,584Mar 11, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A tool to perform Kerberos pre-auth bruteforcing☆3,312Aug 20, 2024Updated last year
- .NET C# Tools☆334Jan 19, 2021Updated 5 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆188Jun 22, 2022Updated 3 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆251Mar 31, 2021Updated 5 years ago
- Active Directory Integrated DNS dumping by any authenticated user☆1,159Apr 4, 2025Updated last year
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,075Updated this week
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,629Jul 10, 2023Updated 2 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,102Apr 13, 2026Updated 2 weeks ago
- ☆14Sep 22, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- New generation of wmiexec.py☆1,282Updated this week
- Use to perform Microsoft exchange account brute-force.☆73Apr 17, 2021Updated 5 years ago
- ☆181Feb 3, 2021Updated 5 years ago
- Tool to create hidden registry keys.☆488Oct 23, 2019Updated 6 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,400Dec 16, 2021Updated 4 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,114May 29, 2024Updated last year
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆770Feb 16, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Remove API hooks from a Beacon process.☆283Sep 18, 2021Updated 4 years ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,460Jan 11, 2023Updated 3 years ago
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆198Feb 1, 2021Updated 5 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆995Jan 29, 2023Updated 3 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆41Aug 6, 2021Updated 4 years ago
- A command shell wrapper using only WMI for Microsoft Windows☆335Jun 24, 2017Updated 8 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆555Jul 3, 2020Updated 5 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,815Sep 4, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Active Directory ACL exploitation with BloodHound☆760Nov 18, 2021Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,443Jul 20, 2024Updated last year
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆67Oct 3, 2020Updated 5 years ago
- Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop☆1,260Nov 2, 2022Updated 3 years ago
- Use to browse the share file by eas(Exchange Server ActiveSync)☆46Jun 28, 2020Updated 5 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,161Apr 22, 2026Updated last week
- Evade sysmon and windows event logging☆624Apr 8, 2020Updated 6 years ago