Leo4j / Invoke-SMBRemotingLinks
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
☆177Updated 4 months ago
Alternatives and similar repositories for Invoke-SMBRemoting
Users that are interested in Invoke-SMBRemoting are comparing it to the libraries listed below
Sorting:
- ☆147Updated 4 months ago
- Inject RDPThief into memory with PowerShell.☆65Updated 8 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆208Updated 11 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆153Updated 3 months ago
- Continuous password spraying tool☆193Updated last week
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆144Updated 6 months ago
- Enumerate Domain Users Without Authentication☆267Updated 5 months ago
- Adversary Emulation Framework☆122Updated 3 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆209Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆110Updated 2 months ago
- Generate and Manage KeyCredentialLinks☆165Updated last month
- Two in one, patch lifetime powershell console, no more etw and amsi!☆98Updated 5 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆245Updated 3 weeks ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆217Updated 11 months ago
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆145Updated last month
- ☆113Updated 4 months ago
- ☆182Updated 3 months ago
- ☆226Updated 11 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Updated last year
- ☆161Updated last year
- ☆91Updated 8 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆194Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated 9 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 8 months ago
- Living off the land searches for explorer and sharepoint☆91Updated 5 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆161Updated 2 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆246Updated 7 months ago