RayRRT / Active-Directory-Certificate-Services-abuseLinks
☆50Updated 2 years ago
Alternatives and similar repositories for Active-Directory-Certificate-Services-abuse
Users that are interested in Active-Directory-Certificate-Services-abuse are comparing it to the libraries listed below
Sorting:
- Secretsdump C# version only supporting local (live) operation☆49Updated last month
- ☆87Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆56Updated 3 years ago
- ☆107Updated 3 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆94Updated last year
- C# havoc implant☆99Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- SAM Dumping in C#☆48Updated 4 months ago
- ☆99Updated last year
- Lateral Movement☆125Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆83Updated 3 years ago
- ☆70Updated 2 years ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆15Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆77Updated 2 years ago
- To audit the security of read-only domain controllers☆117Updated last year
- Execute commands in other Sessions☆88Updated 10 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆87Updated 4 months ago
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆34Updated 2 years ago
- ☆55Updated 3 months ago
- ☆60Updated 3 weeks ago
- Library of BOFs to interact with SQL servers☆174Updated last month
- ☆88Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆35Updated last year
- ☆141Updated 3 years ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆48Updated 3 weeks ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆115Updated 2 months ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆68Updated last month
- Duplicate not owned Token from Running Process☆72Updated last year
- Lateral Movement via the .NET Profiler☆82Updated 6 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆156Updated last year