MzHmO / PowershellKerberos
Some scripts to abuse kerberos using Powershell
☆312Updated last year
Related projects ⓘ
Alternatives and complementary repositories for PowershellKerberos
- ☆275Updated last week
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆366Updated last year
- ☆293Updated last week
- Ask a TGS on behalf of another user without password☆464Updated 3 months ago
- Abusing Intune for Lateral Movement over C2☆266Updated last week
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆315Updated 5 months ago
- Automated Active Directory Enumeration☆412Updated this week
- Custom Queries - Brought Up to BH4.1 syntax☆228Updated last week
- ☆652Updated this week
- ☆168Updated 3 weeks ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆451Updated 2 years ago
- DPAPI looting remotely and locally in Python☆420Updated 3 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆480Updated last year
- Identify the attack paths in BloodHound breaking your AD tiering☆307Updated 2 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆623Updated 7 months ago
- ☆377Updated last year
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆377Updated 7 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆297Updated 8 months ago
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆247Updated 5 months ago
- Make everyone in your VLAN ASRep roastable