Pennyw0rth / NetExec-Wiki
This is the repository which is synced to the gitbook wiki at https://www.netexec.wiki/
☆38Updated 3 weeks ago
Alternatives and similar repositories for NetExec-Wiki:
Users that are interested in NetExec-Wiki are comparing it to the libraries listed below
- Impacket is a collection of Python classes for working with network protocols.☆68Updated 6 months ago
- ☆79Updated last month
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆139Updated 4 months ago
- ☆105Updated 3 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆93Updated 3 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆103Updated 3 weeks ago
- ☆147Updated 11 months ago
- ☆40Updated 3 weeks ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆68Updated 4 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆187Updated 2 months ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆37Updated 11 months ago
- ☆113Updated last year
- Automated exploitation of MSSQL servers at scale☆106Updated 3 weeks ago
- ACL abuse swiss-knife☆119Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆107Updated 3 weeks ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated 2 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆141Updated last year
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- Make everyone in your VLAN ASRep roastable☆177Updated last week
- PowerShell Reverse Shell☆61Updated last year
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆104Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆273Updated 3 months ago
- Continuous password spraying tool☆128Updated last week
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆21Updated 3 weeks ago
- C2 Automation using Linode☆80Updated 2 years ago
- pysnaffler☆88Updated last month
- Python setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆87Updated 3 months ago
- linikatz is a tool to attack AD on UNIX☆142Updated last year