IvanGlinkin / AutoSUIDLinks
AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a way for further escalating the privileges.
☆378Updated last year
Alternatives and similar repositories for AutoSUID
Users that are interested in AutoSUID are comparing it to the libraries listed below
Sorting:
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆302Updated last year
- ☆315Updated 4 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆564Updated 6 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,085Updated 2 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆717Updated 2 years ago
- Red Team Attack Lab for TTP testing & research☆572Updated 2 years ago
- Active Directory Labs/exams Review☆254Updated 4 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆544Updated last year
- Powershell tool to automate Active Directory enumeration.☆1,108Updated 2 months ago
- Kerberoast with ACL abuse capabilities☆474Updated 5 months ago
- ☆772Updated last week
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆206Updated 2 years ago
- Script for generating revshells☆470Updated 8 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,150Updated last year
- Just another Powerview alternative but on steroids☆705Updated last week
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆473Updated 3 weeks ago
- Maximizing BloodHound. Max is a good boy.☆516Updated last month
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆334Updated 3 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆556Updated 3 years ago
- LDAP enumeration tool implemented in Python3☆226Updated 2 weeks ago
- PeTeReport is an open-source application vulnerability reporting tool.☆505Updated 11 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆435Updated last year
- Active Directory pentesting mind map☆428Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆397Updated 4 months ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆388Updated 4 months ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆782Updated 2 years ago
- ☆267Updated last year
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping …☆970Updated 2 weeks ago
- Vulnerability assessment and penetration testing automation and reporting platform for teams.☆456Updated this week
- Identify privilege escalation paths within and across different clouds☆697Updated last month