An old Windows workstations LPE for domain environments without LDAP signing/channel binding.
☆35Feb 4, 2023Updated 3 years ago
Alternatives and similar repositories for DavRelayUp
Users that are interested in DavRelayUp are comparing it to the libraries listed below
Sorting:
- ☆15Sep 4, 2024Updated last year
- ADCS cert template modification and ACL enumeration☆144Jun 26, 2023Updated 2 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- ☆12Oct 9, 2020Updated 5 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆64Feb 8, 2022Updated 4 years ago
- Sniffing files generator☆61Feb 24, 2025Updated last year
- ☆18Sep 14, 2023Updated 2 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- ☆29Oct 15, 2023Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- To audit the security of read-only domain controllers☆118Nov 27, 2023Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆132Oct 1, 2023Updated 2 years ago
- ☆26Nov 8, 2024Updated last year
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- ☆100Sep 1, 2024Updated last year
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆110May 19, 2022Updated 3 years ago
- The code is a pingback to the Dark Vortex blog:☆186Jan 26, 2023Updated 3 years ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- ☆20Sep 6, 2025Updated 5 months ago
- Extracting NetNTLM without touching lsass.exe☆244Nov 27, 2023Updated 2 years ago
- AD ACL abuse☆389Sep 11, 2025Updated 5 months ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆730Sep 3, 2025Updated 6 months ago
- ☆110Feb 13, 2024Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆85Feb 26, 2023Updated 3 years ago
- ☆16Jan 2, 2025Updated last year
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- A Tool for Domain Flyovers - my version of michenriksen's aquatone☆10May 1, 2023Updated 2 years ago
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- Cobalt Strike BOF☆42Dec 10, 2025Updated 2 months ago