Bl4ckM1rror / KerberoShutdownLinks
☆18Updated 3 years ago
Alternatives and similar repositories for KerberoShutdown
Users that are interested in KerberoShutdown are comparing it to the libraries listed below
Sorting:
- Execute Mimikatz with different technique☆51Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Finding SSL Blindspots for Red Teams☆34Updated 5 years ago
- Perform Windows domain enumeration via LDAP☆37Updated 3 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆47Updated 5 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- ☆18Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 5 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Updated 3 years ago
- Right-To-Left Override POC☆36Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆38Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆39Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- Modified version of PEAS client for offensive operations☆43Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆32Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆21Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- pwncat windows c2 components☆20Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Updated 5 months ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆68Updated 4 years ago
- A collection of my presentation materials.☆17Updated last year
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Updated 4 years ago
- c# reverse shell poc☆27Updated 7 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 3 months ago