HadessCS / Awesome-Privilege-EscalationLinks
Awesome Privilege Escalation
☆111Updated 2 years ago
Alternatives and similar repositories for Awesome-Privilege-Escalation
Users that are interested in Awesome-Privilege-Escalation are comparing it to the libraries listed below
Sorting:
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆135Updated last year
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆137Updated last year
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆130Updated 2 months ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆122Updated last year
- Different methods to get current username without using whoami☆177Updated last year
- PowerShell Obfuscator☆178Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆141Updated last year
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆298Updated last month
- Lab used for workshop and CTF☆250Updated last month
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆254Updated last month
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆277Updated last week
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆130Updated last year
- ☆84Updated 4 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆181Updated 9 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆141Updated 5 months ago
- A cheatsheet for NetExec☆130Updated 2 weeks ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆153Updated 2 years ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆159Updated 3 weeks ago
- ☆73Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆297Updated last year
- Continuous password spraying tool☆189Updated 3 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- Amsi Bypass payload that works on Windwos 11☆378Updated last year
- Everything and anything related to password spraying☆141Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆193Updated 3 months ago
- Learning resources and external resources to help you prepare for your offsec certifications☆81Updated 7 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆255Updated 10 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆98Updated last week
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆231Updated 4 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆52Updated 6 months ago