AetherBlack / abuseACLLinks
A python script to automatically list vulnerable Windows ACEs/ACLs.
☆56Updated 2 weeks ago
Alternatives and similar repositories for abuseACL
Users that are interested in abuseACL are comparing it to the libraries listed below
Sorting:
- C++ Reflective Assembly Loader☆27Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆115Updated 2 months ago
- Inject RDPThief into memory with PowerShell.☆64Updated 5 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆102Updated 7 months ago
- ☆88Updated 5 months ago
- ☆109Updated 3 weeks ago
- ☆137Updated last month
- A community-driven collection of BloodHound queries☆37Updated this week
- Most Responder's configuration power in your hand.☆51Updated 5 months ago
- ☆70Updated 3 months ago
- linikatz is a tool to attack AD on UNIX☆148Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆92Updated last month
- ☆71Updated last month
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆75Updated 7 months ago
- Automated exploitation of MSSQL servers at scale☆108Updated last week
- ☆177Updated last month
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆173Updated last month
- Adversary Emulation Framework☆114Updated 11 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆163Updated 2 months ago
- Continuous password spraying tool☆189Updated 3 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆189Updated 10 months ago
- ☆58Updated 3 weeks ago
- Lateral Movement☆124Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆166Updated last month
- ☆29Updated 9 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆128Updated 5 months ago
- ☆159Updated last year
- Tool to extract username and password of current user from PanGPA in plaintext☆85Updated 6 months ago
- ☆118Updated 2 months ago