Leo4j / Invoke-SMBRemotingLinks
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
☆181Updated 8 months ago
Alternatives and similar repositories for Invoke-SMBRemoting
Users that are interested in Invoke-SMBRemoting are comparing it to the libraries listed below
Sorting:
- Inject RDPThief into memory with PowerShell.☆65Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆117Updated 6 months ago
- ☆158Updated 8 months ago
- Continuous password spraying tool☆199Updated last month
- Two in one, patch lifetime powershell console, no more etw and amsi!☆102Updated 9 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆149Updated last year
- Generate and Manage KeyCredentialLinks☆211Updated this week
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated 3 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆213Updated last year
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆162Updated 6 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆147Updated 3 weeks ago
- ☆166Updated last year
- Python alternative to Mimikatz lsadump::dcshadow☆157Updated 7 months ago
- An interactive shell to spoof some LOLBins command line☆188Updated 2 years ago
- Enumerate Domain Users Without Authentication☆281Updated 9 months ago
- ☆186Updated 7 months ago
- Adversary Emulation Framework☆129Updated 7 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆212Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆135Updated last year
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆259Updated 11 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆144Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Updated 9 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆204Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆140Updated 2 years ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆152Updated last year
- ☆94Updated last year
- Just some random Red Team Scripts that can be useful☆154Updated last year
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆287Updated last week
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆206Updated last year
- The different ways to dump lsass☆206Updated 5 months ago