C-Sto / gosecretsdumpLinks
Dump ntds.dit really fast
☆396Updated 3 years ago
Alternatives and similar repositories for gosecretsdump
Users that are interested in gosecretsdump are comparing it to the libraries listed below
Sorting:
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆547Updated 2 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆870Updated 3 years ago
- ☆390Updated 4 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆461Updated 2 years ago
- Cobalt Strike kit for Lateral Movement☆669Updated 5 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆777Updated last year
- Various Cobalt Strike BOFs☆653Updated 2 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆478Updated 3 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆383Updated 4 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆440Updated 3 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆424Updated 5 months ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆734Updated 9 months ago
- ☆456Updated 2 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆365Updated 4 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆605Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆416Updated 3 years ago
- One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/☆152Updated 4 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆217Updated 3 months ago
- Bypass for PowerShell Constrained Language Mode☆393Updated 3 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆329Updated 5 years ago
- Amplify network visibility from multiple POV of other hosts☆305Updated last year
- ☆395Updated 2 weeks ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆340Updated 2 years ago
- Collection of remote authentication triggers in C#☆492Updated last year
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆448Updated 4 years ago
- ☆360Updated 4 years ago
- ☆784Updated 2 years ago
- Dumping LAPS from Python☆271Updated 2 years ago
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆307Updated 2 years ago
- Cobalt Strike Python API☆301Updated 3 years ago