Add SD for controlled computer object to a target object for RBCD using LDAP
☆37Oct 28, 2021Updated 4 years ago
Alternatives and similar repositories for rbcd_permissions
Users that are interested in rbcd_permissions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Nov 24, 2020Updated 5 years ago
- Python Script for SAML2 Authentication Passwordspray☆40Jul 5, 2023Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆622Aug 15, 2025Updated 7 months ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Jul 29, 2021Updated 4 years ago
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆13May 27, 2023Updated 2 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- Get Fine Grained Password Policy☆78Mar 13, 2026Updated last week
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆25Apr 1, 2020Updated 5 years ago
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- C# version of MDSec's ParallelSyscalls☆142Jan 9, 2022Updated 4 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- ☆102Oct 27, 2022Updated 3 years ago
- ADCS cert template modification and ACL enumeration☆143Jun 26, 2023Updated 2 years ago
- Python based BloodHound data importer☆151Jul 5, 2023Updated 2 years ago
- ☆12Feb 19, 2026Updated last month
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- ☆667Nov 17, 2021Updated 4 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53May 31, 2018Updated 7 years ago
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated last month
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆47Jan 14, 2026Updated 2 months ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- Proof-of-concept tools for my AD Forest trust research☆236Jun 10, 2024Updated last year
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- A curated list of awesome BloodhoundAD resources☆237Oct 13, 2022Updated 3 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆170Jun 16, 2022Updated 3 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- DCSync Attack from Outside using Impacket☆115May 2, 2022Updated 3 years ago
- A little scanner to check the LDAP Signing state☆46Aug 2, 2021Updated 4 years ago
- Collection of VBA macro published in our twitter / blog☆157Sep 5, 2022Updated 3 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- ☆145Oct 31, 2023Updated 2 years ago