Hagrid29 / CertifyKit
Active Directory certificate abuse
☆35Updated 2 years ago
Alternatives and similar repositories for CertifyKit:
Users that are interested in CertifyKit are comparing it to the libraries listed below
- Click Once + App Domain☆61Updated last year
- Secretsdump C# version only supporting local (live) operation☆49Updated last year
- A care package of useful bofs for red team engagments☆54Updated 3 months ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆63Updated 2 months ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆83Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆26Updated 4 years ago
- Windows Persistence Toolkit in C#☆36Updated 2 years ago
- ProcExp Driver (Ab)use☆21Updated 2 years ago
- ☆25Updated 3 years ago
- SAM Dumping in C#☆44Updated 2 months ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆38Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆54Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆61Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆20Updated 9 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆53Updated 2 years ago
- ☆25Updated 4 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- ☆28Updated last month
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆51Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆79Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆83Updated 2 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆74Updated 2 years ago
- Active Directory certificate abuse.☆37Updated 3 years ago
- Aggressor script add-in for CobaltStrike to track file uploads☆36Updated 2 years ago
- A LAPS dumper written using the impacket library.☆31Updated last year