Leo4j / Invoke-SMBRemotingLinks
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
☆181Updated 8 months ago
Alternatives and similar repositories for Invoke-SMBRemoting
Users that are interested in Invoke-SMBRemoting are comparing it to the libraries listed below
Sorting:
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated 3 months ago
- Generate and Manage KeyCredentialLinks☆241Updated last week
- Continuous password spraying tool☆200Updated 2 months ago
- Inject RDPThief into memory with PowerShell.☆65Updated last year
- ☆159Updated 9 months ago
- Enumerate Domain Users Without Authentication☆281Updated 9 months ago
- Adversary Emulation Framework☆129Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆149Updated last year
- ☆167Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆212Updated last year
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆149Updated last month
- Python alternative to Mimikatz lsadump::dcshadow☆157Updated 7 months ago
- ☆186Updated 7 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆290Updated 2 weeks ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆103Updated 9 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆119Updated 6 months ago
- ☆94Updated last year
- An interactive shell to spoof some LOLBins command line☆188Updated 2 years ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆212Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆144Updated last week
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆160Updated 2 weeks ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆204Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆153Updated last year
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆174Updated 5 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆213Updated 3 weeks ago
- Living off the land searches for explorer and sharepoint☆92Updated 2 months ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆260Updated last month
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads☆238Updated 3 months ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆229Updated last year
- Tool to extract username and password of current user from PanGPA in plaintext☆89Updated last year