Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption
☆19Aug 5, 2022Updated 3 years ago
Alternatives and similar repositories for Modified-Thycotic-Secret-Stealer
Users that are interested in Modified-Thycotic-Secret-Stealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- ☆88Jul 28, 2022Updated 3 years ago
- Powershell script that decrypts the data stored within a Thycotic Secret Server☆84Aug 3, 2020Updated 5 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- POC tool to abuse windows server failover clusters☆56Aug 7, 2025Updated 7 months ago
- Talk slides and material☆38Mar 24, 2024Updated 2 years ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 3 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆13May 27, 2020Updated 5 years ago
- ☆81Mar 11, 2026Updated 2 weeks ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆178Nov 26, 2021Updated 4 years ago
- ☆13Oct 21, 2023Updated 2 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Aug 4, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 11 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆211Sep 30, 2024Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆304Sep 7, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- ☆28Mar 18, 2026Updated last week
- Collection of small JavaScript functions and scripts that can be used in the browser to interact with Lair☆22Mar 20, 2019Updated 7 years ago
- ☆242Nov 21, 2024Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆401Aug 15, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A module for interacting with the ConfigMgr AdminService☆28Oct 20, 2023Updated 2 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆57Jun 2, 2024Updated last year
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- A Model Context Protocol (MCP) server for automating Ludus v1 and v2 cyber range environments through AI assistants. 190+ tools for range…☆76Updated this week
- Example agents for the Dreadnode platform☆25Dec 19, 2025Updated 3 months ago
- Collection of tools to use with Azure Applications☆113Oct 13, 2023Updated 2 years ago
- ☆160Feb 8, 2025Updated last year