BC-SECURITY / DeathStarPlugin
Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common offensive tactics, techniques, and procedures (TTPs).
☆16Updated this week
Alternatives and similar repositories for DeathStarPlugin:
Users that are interested in DeathStarPlugin are comparing it to the libraries listed below
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Discord C2 Profile for Mythic☆26Updated 9 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 7 months ago
- Situational Awareness script to identify how and where to run implants☆41Updated last month
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- ☆43Updated 6 months ago
- ☆25Updated last year
- ☆52Updated last year
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆18Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆34Updated 4 months ago
- ☆46Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆70Updated last year
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆31Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆40Updated last year
- Nemesis agent for Mythic☆26Updated 4 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 8 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆37Updated 11 months ago
- Federated Office365 user enumeration based on correlated response trend analysis☆48Updated 2 years ago
- ☆48Updated 2 months ago
- My BloodHound custom queries☆23Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated last month
- Validates priv escalation of AD trusts☆34Updated 3 weeks ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆14Updated last year
- Enumerate the Domain for Readable and Writable Shares☆16Updated 7 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 7 months ago