Kerberos CNAME abuse PoC
☆107Jan 27, 2026Updated 3 months ago
Alternatives and similar repositories for MITM6-Kerberos-CNAME-Abuse
Users that are interested in MITM6-Kerberos-CNAME-Abuse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 3 years ago
- AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure Dev…☆30Oct 13, 2025Updated 6 months ago
- ☆24Aug 31, 2025Updated 8 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 6 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆51Jan 31, 2026Updated 3 months ago
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆66Feb 14, 2026Updated 2 months ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 3 months ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆210Nov 18, 2025Updated 5 months ago
- Generate and Manage KeyCredentialLinks☆256Mar 9, 2026Updated 2 months ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆160Feb 14, 2026Updated 2 months ago
- ☆16Jun 15, 2025Updated 10 months ago
- Offensive security toolkit for Claude Code☆153Apr 1, 2026Updated last month
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Red Team Coin for crypto-mining operations.☆24Mar 1, 2026Updated 2 months ago
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- WebSocket shell☆14Nov 29, 2020Updated 5 years ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- ☆108Feb 11, 2026Updated 2 months ago
- YesMan☆19Nov 8, 2023Updated 2 years ago
- Parse Chrome History and Downloads into TSV or TLN format☆15Sep 3, 2016Updated 9 years ago
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆22Apr 21, 2026Updated 2 weeks ago
- ☆24Sep 6, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- CSharp4Pentesters☆11Mar 5, 2022Updated 4 years ago
- Better version of SharpPick☆14Aug 29, 2025Updated 8 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆38Oct 9, 2025Updated 7 months ago
- ☆19Apr 28, 2025Updated last year
- a small script to collect information from a management point☆37Jan 19, 2026Updated 3 months ago
- Active Directory Certificate Services (ADCS) enumeration library with BloodHound CE v6 export support☆77Apr 26, 2026Updated last week
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Validates priv escalation of AD trusts☆47Apr 1, 2025Updated last year
- This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.☆43Apr 23, 2026Updated 2 weeks ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆454Nov 3, 2025Updated 6 months ago
- LaTeX Report Template for Offensive Security's OSCP Exam.☆14Mar 13, 2022Updated 4 years ago
- Parses nessus vulnerability scan data to streamline CVE POC lookups☆14Mar 13, 2025Updated last year
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆18Jan 4, 2026Updated 4 months ago
- Let's make quick work of GraphQL instances ;)☆26Mar 8, 2026Updated 2 months ago