Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments
☆132Aug 10, 2021Updated 4 years ago
Alternatives and similar repositories for Get-RBCD-Threaded
Users that are interested in Get-RBCD-Threaded are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆198Feb 1, 2021Updated 5 years ago
- Spray a hash via smb to check for local administrator access☆142Feb 7, 2021Updated 5 years ago
- ☆281Dec 30, 2020Updated 5 years ago
- .NET 4.0 WinRM API Command Execution☆166Sep 11, 2020Updated 5 years ago
- Create a minidump of the LSASS process from memory☆260Nov 2, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆332Oct 20, 2019Updated 6 years ago
- SMBExec C# module☆219Aug 21, 2020Updated 5 years ago
- lateral movement techniques that can be used during red team exercises☆278Jan 13, 2020Updated 6 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- ☆197Mar 19, 2020Updated 6 years ago
- C# Script used for Red Team☆722Nov 16, 2021Updated 4 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆318Dec 19, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- C# Situational Awareness Script☆34Apr 26, 2019Updated 7 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- Miscellaneous Tools☆270Oct 29, 2020Updated 5 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- .NET tool for enumeration processes and dumping memory.☆56Apr 4, 2019Updated 7 years ago
- ☆181Feb 3, 2021Updated 5 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Run Rubeus via Rundll32☆211Apr 25, 2020Updated 6 years ago
- Tool to create hidden registry keys.☆488Oct 23, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Silencing Sysmon via driver unload☆238Oct 13, 2022Updated 3 years ago
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆637Oct 18, 2025Updated 6 months ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- POC for .NET mssql client for accessing database data through beacon☆64Sep 12, 2023Updated 2 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- c# implementation of Active Directory Integrated DNS dumping (authenticated user)☆207May 25, 2021Updated 4 years ago
- ☆351Feb 21, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆632Aug 15, 2025Updated 8 months ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Lockless allows for the copying of locked files.☆255Apr 30, 2021Updated 4 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆354Dec 1, 2020Updated 5 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆424Jul 27, 2022Updated 3 years ago
- AMSI Bypass Via the Heap☆107Nov 20, 2020Updated 5 years ago