Paradoxis / ADSyncDump-BOFLinks
The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencies.
☆71Updated this week
Alternatives and similar repositories for ADSyncDump-BOF
Users that are interested in ADSyncDump-BOF are comparing it to the libraries listed below
Sorting:
- ☆49Updated 4 months ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Updated 6 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆38Updated 2 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆34Updated 2 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆124Updated this week
- ☆23Updated this week
- A python script that automates a C2 Profile build☆43Updated 5 months ago
- Client-side Encrypted Upload Server Python Script☆64Updated last month
- ☆39Updated 6 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆47Updated 4 months ago
- ☆24Updated 3 weeks ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆42Updated 8 months ago
- ☆33Updated last month
- ☆65Updated last year
- ☆57Updated 6 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆53Updated last month
- SCEP request tool for AD CS and Intune☆63Updated 3 weeks ago
- ☆50Updated 9 months ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Updated 3 weeks ago
- Enumerate the Domain for Readable and Writable Shares☆20Updated 6 months ago
- ☆26Updated 6 months ago
- rust port of pspy with support for process monitoring over dbus☆34Updated 2 months ago
- Impersonate Windows tokens in Nim☆22Updated 3 weeks ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆65Updated last month
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆49Updated 3 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆97Updated last month
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 6 months ago
- TokenCert☆100Updated 9 months ago
- Dump Kerberos tickets☆37Updated 3 weeks ago
- Local SYSTEM auth trigger for relaying - X☆136Updated last month