Jumbo-WJB / search_rbcd
Search msDS-AllowedToActOnBehalfOfOtherIdentity
☆35Updated 3 years ago
Alternatives and similar repositories for search_rbcd:
Users that are interested in search_rbcd are comparing it to the libraries listed below
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user; Adding the sam_the_admin_maq when MachineAccoun…☆22Updated 10 months ago
- ☆46Updated 3 years ago
- 使用Csharp实现自动修改注册表键并强制锁屏,使其可被抓取明文密码。☆30Updated 4 years ago
- 通过websocket在IIS8(Windows Server 2012)以上实现socks5代理☆85Updated last year
- ☆34Updated 3 years ago
- If you only have hash, you can still operate exchange☆72Updated 3 years ago
- SAMR修改域内主机密码☆10Updated 3 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆23Updated 3 years ago
- ☆15Updated last year
- ☆34Updated last month
- 密码收集☆58Updated 3 years ago
- PortBender修改为exe版本☆26Updated last year
- ☆3Updated 2 years ago
- ad vulnerability scanner☆70Updated last year
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆14Updated 3 years ago
- OXID_Find by Csharp(多线程) 通过OXID解析器获取Windows远程主机上网卡地址 From @RcoIl☆53Updated 4 years ago
- (批量化改造)sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。☆107Updated 4 years ago
- 使用MiniDumpWriteDump与RtlReportSilentProcessExit实现提取lsass.dmp的工具☆11Updated 3 years ago
- ☆49Updated last year
- druid数据库密码解密☆31Updated last year
- ActiveMQ RCE (CVE-2023-46604) 回显利用工具☆16Updated 6 months ago
- Bloodhound 数据解析工具☆22Updated last year
- ☆25Updated last year
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆71Updated last year
- 根据攻防以及域信息收集经验dump快而有用的域信息☆103Updated last year
- KillDefender的实现☆12Updated 3 years ago
- c/s网络准入平台☆20Updated 2 years ago
- Backdoor&后渗透工具☆21Updated 3 years ago
- MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability☆19Updated 3 years ago
- C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can…☆16Updated 3 years ago