Dec0ne / DavRelayUp
DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the default settings).
☆532Updated last year
Alternatives and similar repositories for DavRelayUp:
Users that are interested in DavRelayUp are comparing it to the libraries listed below
- DPAPI looting remotely and locally in Python☆434Updated this week
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆588Updated 6 months ago
- Collection of remote authentication triggers in C#☆472Updated 8 months ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆408Updated last week
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆453Updated 2 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆397Updated 11 months ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆557Updated 5 months ago
- Dump NTDS with golden certificates and UnPAC the hash☆629Updated 9 months ago
- AD ACL abuse☆270Updated this week
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆403Updated last month
- Partial python implementation of SharpGPOAbuse☆379Updated 10 months ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆307Updated 2 years ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆408Updated 2 months ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆556Updated last month
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆443Updated 6 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆383Updated 9 months ago
- Recovering NTLM hashes from Credential Guard☆331Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆378Updated last year
- .net config loader☆311Updated last year
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆508Updated 10 months ago
- Protected Process Dumper Tool☆527Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆268Updated 2 months ago
- Attempt at Obfuscated version of SharpCollection☆203Updated last week
- Ask a TGS on behalf of another user without password☆467Updated 5 months ago
- Creating a repository with all public Beacon Object Files (BoFs)☆443Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆317Updated 10 months ago
- XLL Phishing Tradecraft☆401Updated 2 years ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆504Updated 9 months ago
- ☆212Updated 3 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆501Updated 5 months ago