GoSecure / pywsus
Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.
☆301Updated 2 years ago
Alternatives and similar repositories for pywsus:
Users that are interested in pywsus are comparing it to the libraries listed below
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆353Updated 4 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆480Updated 2 months ago
- "Golden" certificates☆653Updated 5 months ago
- Python version of the C# tool for "Shadow Credentials" attacks☆668Updated 2 months ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆519Updated 2 years ago
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆403Updated this week
- A User Impersonation tool - via Token or Shellcode injection☆409Updated 2 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆809Updated 3 years ago
- ☆358Updated 3 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆737Updated last year
- LDAP library for auditing MS AD☆403Updated this week
- A tool to help query AD via the LDAP protocol☆508Updated 4 months ago
- ☆650Updated 2 weeks ago
- Partial python implementation of SharpGPOAbuse☆388Updated 11 months ago
- Maximizing BloodHound. Max is a good boy.☆504Updated 2 weeks ago
- Password spraying tool and Bloodhound integration☆220Updated last month
- ☆759Updated 2 years ago
- Kerberoast attack -pure python-☆425Updated last year
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆383Updated 10 months ago
- Collection of remote authentication triggers in C#☆473Updated 9 months ago
- NTLM relaying for Windows made easy☆555Updated last year
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆259Updated last year
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆848Updated 3 months ago
- PowerShell Constrained Language Mode Bypass☆247Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆221Updated 3 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆456Updated 2 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆397Updated last year
- Dumping LAPS from Python☆260Updated 2 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆271Updated 3 years ago
- ☆208Updated last year