Qazeer / OffensivePythonPipeline
Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, and Make.
☆100Updated 2 years ago
Alternatives and similar repositories for OffensivePythonPipeline:
Users that are interested in OffensivePythonPipeline are comparing it to the libraries listed below
- Determine if the WebClient Service (WebDAV) is running on a remote system☆133Updated last year
- ADCS cert template modification and ACL enumeration☆136Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- ☆159Updated 5 months ago
- ☆55Updated 2 months ago
- ☆141Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆254Updated last year
- ☆117Updated 3 weeks ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆55Updated 4 years ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆129Updated last year
- ACL abuse swiss-knife☆120Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆235Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆52Updated 10 months ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆90Updated 11 months ago
- Get Fine Grained Password Policy☆70Updated last week
- ☆90Updated 2 months ago
- ☆151Updated 2 months ago
- Buggy script to play with GPOs☆94Updated 3 months ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆88Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆171Updated 2 years ago
- C# version of Powermad☆165Updated last year
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆122Updated 3 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆106Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆179Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆147Updated 6 months ago
- Beacon Object File & C# project to check LDAP signing☆189Updated 8 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated 2 years ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆38Updated 2 months ago