C-Sto / gosecretsdump
Dump ntds.dit really fast
☆392Updated 3 years ago
Alternatives and similar repositories for gosecretsdump:
Users that are interested in gosecretsdump are comparing it to the libraries listed below
- ☆383Updated 4 years ago
- Cobalt Strike kit for Lateral Movement☆667Updated 5 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆537Updated 2 years ago
- Bypass for PowerShell Constrained Language Mode☆390Updated 3 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆437Updated 3 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆766Updated last year
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆711Updated 8 months ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆479Updated 2 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆851Updated 3 years ago
- Various Cobalt Strike BOFs☆636Updated 2 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆378Updated 4 years ago
- ☆391Updated 8 months ago
- ☆358Updated 4 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆337Updated 2 years ago
- One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/☆149Updated 4 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆457Updated 2 years ago
- PIC lsass dumper using cloned handles☆584Updated 2 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆445Updated 4 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆602Updated 2 years ago
- Cobalt Strike kit for Persistence☆475Updated 5 years ago
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The …☆340Updated last year
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆401Updated last year
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆327Updated 5 years ago
- ☆351Updated last year
- Collection of remote authentication triggers in C#☆484Updated 11 months ago
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆304Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆493Updated 5 months ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆486Updated 4 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Updated last year
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆360Updated 4 years ago