CCob / gssapi-abuse
A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks
☆133Updated last year
Related projects: ⓘ
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆164Updated last year
- ☆110Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆114Updated last month
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆85Updated 2 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆104Updated 4 months ago
- Lateral Movement☆117Updated 10 months ago
- Some scripts to support with importing large datasets into BloodHound☆75Updated 9 months ago
- ☆144Updated 7 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆131Updated last month
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆75Updated last week
- ☆139Updated 6 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆76Updated 3 weeks ago
- ☆174Updated 5 months ago
- ☆20Updated 5 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆79Updated 2 months ago
- Disconnected GPO Editor - A Group Policy Manager launcher to allow editing of domain GPOs from non-domain joined machines☆55Updated 2 weeks ago
- pysnaffler☆83Updated last month
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆117Updated last month
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆105Updated 4 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆117Updated 6 months ago
- ☆65Updated last month
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆71Updated 5 months ago
- Hybrid AD utilities for ROADtools☆59Updated last month
- ADCS cert template modification and ACL enumeration☆126Updated last year
- Microsoft Graph API post-exploitation toolkit☆90Updated 2 months ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆95Updated 2 years ago
- Serverless Redirector in various cloud vendor for red team☆69Updated last year
- PowerShell Reverse Shell☆60Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆80Updated 3 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆87Updated last year