OffsecDeer / TargetedTimeroastLinks
Tamper Active Directory user attributes to collect their hashes with MS-SNTP
☆57Updated last year
Alternatives and similar repositories for TargetedTimeroast
Users that are interested in TargetedTimeroast are comparing it to the libraries listed below
Sorting:
- ☆59Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Updated 6 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- ☆59Updated last year
- in-process powershell runner for BRC4☆48Updated 2 years ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆27Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Source code and examples for PassiveAggression☆64Updated last year
- A small red team course☆40Updated 2 years ago
- Duplicate not owned Token from Running Process☆74Updated 2 years ago
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆38Updated last year
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆45Updated 10 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆50Updated last year
- ☆57Updated 11 months ago
- Proof of Concept Exploit for CVE-2024-9465☆30Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆94Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆45Updated last year
- Microsoft Network Service Fingerprinting Tool☆65Updated last month
- Permanently disable EDRs as local admin☆125Updated last month
- Tool to aid in dumping LSASS process remotely☆42Updated 4 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Updated 5 months ago
- ☆86Updated 8 months ago
- Sniffing files generator☆60Updated 11 months ago
- ☆109Updated 11 months ago
- ☆44Updated last year
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆57Updated 7 months ago