Kerberos CNAME abuse PoC
☆79Jan 27, 2026Updated last month
Alternatives and similar repositories for MITM6-Kerberos-CNAME-Abuse
Users that are interested in MITM6-Kerberos-CNAME-Abuse are comparing it to the libraries listed below
Sorting:
- AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure Dev…☆25Oct 13, 2025Updated 4 months ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 2 years ago
- ☆12Apr 8, 2025Updated 11 months ago
- Security Workshop | Azure☆10Jul 28, 2020Updated 5 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Dec 7, 2025Updated 3 months ago
- Validates priv escalation of AD trusts☆47Apr 1, 2025Updated 11 months ago
- A course about terraform☆11Apr 13, 2021Updated 4 years ago
- Secure NotebookLM MCP Server - Query Google NotebookLM from Claude/AI agents with 14 security hardening layers☆37Mar 2, 2026Updated last week
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- Parses nessus vulnerability scan data to streamline CVE POC lookups☆14Mar 13, 2025Updated 11 months ago
- Collection of exploits developed by your friendly clown☆15Oct 18, 2025Updated 4 months ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 10 months ago
- An interactive remote control panel for various devices☆15Feb 28, 2022Updated 4 years ago
- Creating a virtual machine template under Ubuntu Server 24.04 LTS from ISO file with Packer using VMware Workstation☆10Jul 28, 2025Updated 7 months ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Docker deployment configuration for Astral app - a GitHub stars organizer application with Laravel and PHP.☆13May 2, 2020Updated 5 years ago
- ☆20Jul 18, 2025Updated 7 months ago
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆14Jan 4, 2026Updated 2 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- ☆16Jun 15, 2025Updated 8 months ago
- Keygen☆12Feb 3, 2017Updated 9 years ago
- Microsoft Defender for Cloud attack simulation toolkit☆26Dec 24, 2024Updated last year
- Baseline Landing Zone☆12Dec 6, 2024Updated last year
- ☆21Nov 13, 2025Updated 3 months ago
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 5 months ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- ☆13Nov 3, 2023Updated 2 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- Just simple PoC for the Atlassian Jira exploit. Provides code execution for unauthorised user on a server.☆11Jul 21, 2022Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- YesMan☆16Nov 8, 2023Updated 2 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Encode/Decode video to and from memory☆12Feb 22, 2012Updated 14 years ago
- An exploit for CVE-2018-5955 GitStack 2.3.10 Unauthenticated RCE☆10Nov 15, 2024Updated last year
- Rayman 2 level editor☆10Jan 11, 2017Updated 9 years ago
- UEVR fixes for FINAL FANTASY VII REMAKE INTERGRADE☆13Feb 24, 2024Updated 2 years ago