Bl4ckM1rror / KerberoShutdownView external linksLinks
☆18Aug 1, 2022Updated 3 years ago
Alternatives and similar repositories for KerberoShutdown
Users that are interested in KerberoShutdown are comparing it to the libraries listed below
Sorting:
- Just another Process Injection using Process Hollowing technique.☆19Sep 18, 2023Updated 2 years ago
- ☆61Dec 15, 2023Updated 2 years ago
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 2 months ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 10 months ago
- Setup for windows kernel development (development, debugging automation and compiling)☆17Jan 30, 2021Updated 5 years ago
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated 11 months ago
- ASLR Disabler (x86 / x64) - Little utility for disabling the ASLR on PE files☆16Aug 1, 2023Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 5 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Nov 21, 2018Updated 7 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 2 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- Identify common attack paths to get Domain Administrator☆22Aug 20, 2019Updated 6 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Python3 Ebowla... 3Bowla☆17Jan 7, 2020Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- Hiding SSH public keys in SSH server using a kernel agent☆23Dec 24, 2020Updated 5 years ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆106Dec 11, 2023Updated 2 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Dec 18, 2024Updated last year
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago
- DDoor - cross platform backdoor using dns txt records☆30Sep 27, 2021Updated 4 years ago
- Tool for efficient directory enumeration☆65Jan 27, 2026Updated 3 weeks ago
- Using LNK files and user input simulation to start processes under explorer.exe☆33Sep 21, 2024Updated last year
- Service Enumeration C# .NET Assembly☆59Sep 14, 2021Updated 4 years ago
- reverse socks tunneler with ntlm and proxy support☆28Nov 24, 2019Updated 6 years ago
- reven2-scripts contains a set of REVEN scripts to automate timeless-analysis on REVEN traces.☆30Aug 31, 2022Updated 3 years ago
- oneliner is a tool that gives a list of compatible reverse-shell-string oneliners☆24Jul 30, 2016Updated 9 years ago
- Gather and scrape info from the LinkedIn profiles of a company's employees.☆28Mar 7, 2023Updated 2 years ago