GoSecure / pywsus
Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.
☆303Updated 2 years ago
Alternatives and similar repositories for pywsus:
Users that are interested in pywsus are comparing it to the libraries listed below
- ☆375Updated 3 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆355Updated 4 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆490Updated 4 months ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆839Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆387Updated last year
- "Golden" certificates☆663Updated 8 months ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆527Updated 2 years ago
- A tool to help query AD via the LDAP protocol☆531Updated 6 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆231Updated 3 years ago
- PowerShell Constrained Language Mode Bypass☆260Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆754Updated last year
- Enumerate Domain Data☆325Updated last year
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆400Updated last year
- A User Impersonation tool - via Token or Shellcode injection☆412Updated 2 years ago
- Collection of remote authentication triggers in C#☆481Updated 11 months ago
- Dump NTDS with golden certificates and UnPAC the hash☆632Updated last year
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆864Updated 5 months ago
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆411Updated 2 months ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆519Updated 2 years ago
- Partial python implementation of SharpGPOAbuse☆412Updated last year
- Bypass for PowerShell Constrained Language Mode☆388Updated 3 years ago
- Maximizing BloodHound. Max is a good boy.☆512Updated 2 months ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆421Updated 2 years ago
- LDAP library for auditing MS AD☆412Updated last month
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆327Updated last year
- ☆673Updated 2 months ago
- ☆356Updated 3 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆364Updated 5 months ago
- ☆216Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆459Updated 2 years ago