C0axx / Modified-Thycotic-Secret-Stealer
Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption
☆18Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Modified-Thycotic-Secret-Stealer
- Scripts to interact with Microsoft Graph APIs☆31Updated 2 weeks ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆15Updated 2 months ago
- Threadless Injection Payload Toolkit☆11Updated last year
- ☆51Updated 3 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆18Updated 11 months ago
- ☆23Updated 3 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆18Updated 5 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- ☆37Updated 6 months ago
- A small go tool to upload JSON files to the BloodHound community edition API☆28Updated 5 months ago
- ☆35Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆47Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆22Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆47Updated 2 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆40Updated 2 months ago
- ☆13Updated last year
- Find Inbound Email Domains☆21Updated 11 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆16Updated 8 months ago
- terraform deployment for red team☆21Updated last year
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆51Updated 4 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- ☆24Updated 3 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆35Updated 2 months ago
- ☆68Updated last year
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- ☆42Updated 10 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆20Updated 3 years ago