Bl4ckM1rror / KerberoShutdownLinks
☆18Updated 3 years ago
Alternatives and similar repositories for KerberoShutdown
Users that are interested in KerberoShutdown are comparing it to the libraries listed below
Sorting:
- Execute Mimikatz with different technique☆51Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆37Updated 3 years ago
- Spin up a reverse proxy quickly on Heroku☆15Updated 5 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆47Updated 5 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- c# reverse shell poc☆26Updated 7 years ago
- Modified version of PEAS client for offensive operations☆43Updated 2 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆48Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- Polymorphic code obfuscator for use in Red Team operations☆32Updated 3 years ago
- Finding SSL Blindspots for Red Teams☆34Updated 5 years ago
- Red Team C2 and Post Exploitation code☆35Updated 5 months ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 4 years ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Updated 4 years ago
- ☆37Updated 5 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated 2 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Updated 4 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- AppXSVC Service race condition - privilege escalation☆29Updated 6 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 5 years ago
- Right-To-Left Override POC☆36Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Updated 3 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆39Updated 2 years ago