GhostPack / Certify
Active Directory certificate abuse.
☆1,591Updated 6 months ago
Alternatives and similar repositories for Certify:
Users that are interested in Certify are comparing it to the libraries listed below
- C# Data Collector for BloodHound☆839Updated this week
- Tool for Active Directory Certificate Services enumeration and abuse☆2,592Updated 6 months ago
- ☆1,565Updated 8 months ago
- SharpUp is a C# port of various PowerUp functionality.☆1,318Updated last year
- Microsoft signed ActiveDirectory PowerShell module☆880Updated 5 years ago
- Kerberos unconstrained delegation abuse toolkit☆1,246Updated 3 weeks ago
- Powershell tool to automate Active Directory enumeration.☆1,058Updated last month
- Compiled Binaries for Ghostpack☆1,267Updated 3 months ago
- A Python based ingestor for BloodHound☆2,030Updated last week
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,508Updated 2 weeks ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,389Updated last week
- PowerShell MachineAccountQuota and DNS exploit tools☆1,276Updated 2 years ago
- Dumping DPAPI credz remotely☆1,070Updated 3 months ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,563Updated 2 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,071Updated 8 months ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆1,822Updated 2 months ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping …☆930Updated last month
- Extract credentials from lsass remotely☆2,084Updated last month
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆749Updated 4 months ago
- The Hunt for Malicious Strings☆1,168Updated 2 years ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,252Updated last week
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆850Updated 3 months ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆753Updated last week
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,115Updated 7 months ago
- ☆1,445Updated last year
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,118Updated 4 years ago
- SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.☆1,210Updated 7 months ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,218Updated last year
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,097Updated last year
- The swiss army knife of LSASS dumping☆1,858Updated 5 months ago