G0ldenGunSec / GetWebDAVStatus
Determine if the WebClient Service (WebDAV) is running on a remote system
☆123Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for GetWebDAVStatus
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆138Updated 8 months ago
- ADCS cert template modification and ACL enumeration☆129Updated last year
- ☆138Updated 2 years ago
- ☆73Updated 7 months ago
- Beacon Object File & C# project to check LDAP signing☆173Updated 3 months ago
- ☆77Updated last year
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆119Updated 3 years ago
- ☆146Updated last year
- ☆94Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆78Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆86Updated 2 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆48Updated 5 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆250Updated last year
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆59Updated last month
- C# version of Powermad☆156Updated 11 months ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated last month
- ☆36Updated last month
- ☆151Updated 2 weeks ago
- Useful Cobalt Strike BOFs found or used during engagements☆131Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆72Updated last year
- ☆119Updated last year
- Coerce Windows machines auth via MS-EVEN☆153Updated 10 months ago
- Get Fine Grained Password Policy☆65Updated 6 months ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆76Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆173Updated 2 years ago
- ☆133Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆155Updated last year
- Repository contains psexec, which will help to exploit the forgotten pipe☆163Updated 2 weeks ago
- ☆143Updated last year