Dec0ne / DavRelayUp
DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the default settings).
☆539Updated last year
Alternatives and similar repositories for DavRelayUp:
Users that are interested in DavRelayUp are comparing it to the libraries listed below
- DPAPI looting remotely and locally in Python☆448Updated 3 weeks ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆443Updated last month
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆579Updated 3 months ago
- Collection of remote authentication triggers in C#☆477Updated 10 months ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆608Updated 8 months ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆417Updated 2 months ago
- Dump NTDS with golden certificates and UnPAC the hash☆633Updated last year
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆435Updated last month
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆311Updated 2 years ago
- Attempt at Obfuscated version of SharpCollection☆205Updated last month
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆458Updated 2 years ago
- AD ACL abuse☆288Updated this week
- Useful C2 techniques and cheatsheets learned from engagements☆478Updated last week
- Timeroasting scripts by Tom Tervoort☆276Updated last year
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆400Updated last year
- Ask a TGS on behalf of another user without password☆467Updated 7 months ago
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆514Updated last month
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆521Updated last year
- Creating a repository with all public Beacon Object Files (BoFs)☆464Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆320Updated last year
- UAC Bypass By Abusing Kerberos Tickets☆494Updated last year
- A User Impersonation tool - via Token or Shellcode injection☆411Updated 2 years ago
- Recovering NTLM hashes from Credential Guard☆333Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆378Updated 2 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆571Updated 8 months ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆270Updated 3 years ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆487Updated last year
- Partial python implementation of SharpGPOAbuse☆407Updated last year
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆409Updated last year
- shellcode loader for your evasion needs☆317Updated 4 months ago