MWR-CyberSec / AD-CS-Forest-Exploiter
Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise
☆36Updated last year
Alternatives and similar repositories for AD-CS-Forest-Exploiter:
Users that are interested in AD-CS-Forest-Exploiter are comparing it to the libraries listed below
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆28Updated last week
- DFSCoerce exe revisited version with custom authentication☆38Updated 11 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆29Updated this week
- Proof of Concept Exploit for CVE-2024-9465☆27Updated 2 months ago
- Extract registry and NTDS secrets from local or remote disk images☆34Updated 3 months ago
- Tool to aid in dumping LSASS process remotely☆27Updated 4 months ago
- ☆16Updated 2 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆30Updated 6 months ago
- Source code and examples for PassiveAggression☆54Updated 6 months ago
- SAM Dumping in C#☆36Updated 6 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated 11 months ago
- Analyzes AdminSDHolder permissions & compares with a previous run, to detect potential backdoor/excessive persistent permission(s)☆14Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆35Updated last year
- Office 365 and Exchange Enumeration Version 2☆18Updated 10 months ago
- ☆46Updated last year
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆19Updated 6 months ago
- Exploit for CVE-2024-5009☆13Updated 5 months ago
- Beacon Object Files (BOF) for Cobalt Strike.☆28Updated 3 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆42Updated 4 months ago
- A simple rpc2socks alternative in pure Go.☆26Updated 5 months ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆16Updated 8 months ago
- ☆24Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆15Updated 3 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 6 months ago
- ☆14Updated 9 months ago