HernanRodriguez1 / MimikatzFUD
☆98Updated 3 years ago
Alternatives and similar repositories for MimikatzFUD
Users that are interested in MimikatzFUD are comparing it to the libraries listed below
Sorting:
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆143Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆174Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆108Updated 2 weeks ago
- Cortex XDR Config Extractor☆132Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆138Updated last year
- ☆117Updated last month
- Azure AD cheatsheet for the CARTP course☆116Updated 3 years ago
- ☆159Updated 6 months ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆184Updated 2 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆126Updated 3 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated 11 months ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆254Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆139Updated 9 months ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 3 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆386Updated last month
- ACL abuse swiss-knife☆123Updated 2 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆97Updated 3 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- ☆246Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- AzureAD Pentest☆19Updated 3 years ago
- Modular Enumeration and Password Spraying Framework☆117Updated last year
- ☆122Updated last year
- a map for the azure oriented pentests☆67Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆220Updated this week
- OPSEC safe Kerberoasting in C#☆191Updated 2 years ago