Use python to perform Kerberos pre-auth bruteforcing
☆208Apr 16, 2023Updated 2 years ago
Alternatives and similar repositories for pyKerbrute
Users that are interested in pyKerbrute are comparing it to the libraries listed below
Sorting:
- A Bypass Anti-virus Software Lateral Movement Command Execution Tool☆1,464Jan 20, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆38Oct 13, 2021Updated 4 years ago
- c# implementation of Active Directory Integrated DNS dumping (authenticated user)☆206May 25, 2021Updated 4 years ago
- SharpSQLTools 和@Rcoil一起写的小工具,可上传下载文件,xp_cmdshell与sp_oacreate执行命令回显和clr加载程序集执行相应操作。☆964Aug 5, 2021Updated 4 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,553Mar 11, 2026Updated last week
- A tool to perform Kerberos pre-auth bruteforcing☆3,279Aug 20, 2024Updated last year
- .NET C# Tools☆333Jan 19, 2021Updated 5 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆250Mar 31, 2021Updated 4 years ago
- Active Directory Integrated DNS dumping by any authenticated user☆1,146Apr 4, 2025Updated 11 months ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,063Jan 22, 2026Updated last month
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,608Jul 10, 2023Updated 2 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,098Updated this week
- ☆14Sep 22, 2019Updated 6 years ago
- New generation of wmiexec.py☆1,269Jan 5, 2026Updated 2 months ago
- Use to perform Microsoft exchange account brute-force.☆73Apr 17, 2021Updated 4 years ago
- ☆181Feb 3, 2021Updated 5 years ago
- Tool to create hidden registry keys.☆490Oct 23, 2019Updated 6 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,097May 29, 2024Updated last year
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,397Dec 16, 2021Updated 4 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- Remove API hooks from a Beacon process.☆282Sep 18, 2021Updated 4 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆769Feb 16, 2021Updated 5 years ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,439Jan 11, 2023Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆982Jan 29, 2023Updated 3 years ago
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆197Feb 1, 2021Updated 5 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆41Aug 6, 2021Updated 4 years ago
- A command shell wrapper using only WMI for Microsoft Windows☆334Jun 24, 2017Updated 8 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆556Jul 3, 2020Updated 5 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆756Nov 18, 2021Updated 4 years ago
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,812Sep 4, 2024Updated last year
- Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop☆1,245Nov 2, 2022Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,432Jul 20, 2024Updated last year
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- Use to browse the share file by eas(Exchange Server ActiveSync)☆46Jun 28, 2020Updated 5 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,122Feb 27, 2026Updated 3 weeks ago
- Evade sysmon and windows event logging☆625Apr 8, 2020Updated 5 years ago