Luct0r / KerberOPSECLinks
OPSEC safe Kerberoasting in C#
☆193Updated 3 years ago
Alternatives and similar repositories for KerberOPSEC
Users that are interested in KerberOPSEC are comparing it to the libraries listed below
Sorting:
- ☆158Updated 9 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆260Updated 2 years ago
- Beacon Object File & C# project to check LDAP signing☆196Updated last year
- ☆196Updated 3 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆140Updated last year
- ☆251Updated 2 years ago
- ☆223Updated 2 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆129Updated 4 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆238Updated 2 years ago
- ADCS cert template modification and ACL enumeration☆143Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆131Updated 3 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆189Updated 2 years ago
- Simple C# implementation of PowerUpSQL☆94Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆298Updated 2 years ago
- Koppeling x Metatwin x LazySign☆215Updated 4 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- ☆166Updated 3 years ago
- ACL abuse swiss-knife☆125Updated 2 years ago
- Buggy script to play with GPOs☆119Updated 11 months ago
- ☆214Updated last year
- GolenGMSA tool for working with GMSA passwords☆163Updated 3 months ago
- ☆119Updated 8 months ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆178Updated 4 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆184Updated last year
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆181Updated 3 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆270Updated 2 years ago
- Fully modular persistence framework☆257Updated 2 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆245Updated 3 years ago
- Collection of random RedTeam scripts.☆207Updated last year