Pennyw0rth / NetExec-Wiki
This is the repository which is synced to the gitbook wiki at https://www.netexec.wiki/
☆28Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for NetExec-Wiki
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆166Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆68Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆34Updated 8 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆94Updated 5 months ago
- ☆112Updated last year
- ☆142Updated 8 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆63Updated this week
- PowerShell Reverse Shell☆61Updated last year
- Parses Snaffler output file and generate beautified outputs.☆37Updated 2 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆126Updated last week
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆64Updated 3 weeks ago
- Make everyone in your VLAN ASRep roastable☆135Updated 4 months ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆93Updated 2 weeks ago
- ☆33Updated 3 weeks ago
- A Python POC for CRED1 over SOCKS5☆130Updated last month
- pysnaffler☆85Updated 2 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆86Updated last week
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆130Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆67Updated 2 months ago
- Automated exploitation of MSSQL servers at scale☆81Updated last week
- A Python based ingestor for BloodHound☆81Updated 2 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆96Updated 2 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆70Updated last week
- Some scripts to support with importing large datasets into BloodHound☆76Updated 11 months ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆108Updated 4 years ago
- A collection of Cobalt Strike Aggressor scripts.☆84Updated 2 years ago
- ☆181Updated 7 months ago
- ☆70Updated 4 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆85Updated last year
- SeRestorePrivilege to SYSTEM☆77Updated 3 years ago