☆56Sep 13, 2022Updated 3 years ago
Alternatives and similar repositories for Active-Directory-Certificate-Services-abuse
Users that are interested in Active-Directory-Certificate-Services-abuse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 9 months ago
- ☆16Nov 23, 2021Updated 4 years ago
- ☆39Feb 26, 2026Updated last month
- ☆22Sep 6, 2025Updated 7 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆348Nov 19, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆100Sep 1, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆43Jan 13, 2024Updated 2 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- Windows AppLocker Driver (appid.sys) LPE☆76Jul 29, 2024Updated last year
- ☆235Oct 8, 2024Updated last year
- 一个普通的BOF用来BypassUAC☆22Apr 6, 2024Updated 2 years ago
- Local SYSTEM auth trigger for relaying☆171Jul 22, 2025Updated 8 months ago
- Aggressor script add-in for CobaltStrike to track file uploads☆48Nov 7, 2022Updated 3 years ago
- Simple windows rpc server for research purposes only☆82May 29, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Collection of remote authentication triggers in C#☆526May 15, 2024Updated last year
- ☆15Aug 17, 2023Updated 2 years ago
- Local Privilege Escalation Affecting Millions of Gaming Laptops☆63Jan 19, 2026Updated 3 months ago
- Cobalt Strike random C2 Profile generator☆16Apr 3, 2026Updated 2 weeks ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆428Feb 11, 2024Updated 2 years ago
- One WSL BOF to rule them all☆174Jan 14, 2026Updated 3 months ago
- IAT-Obfuscation to make static analysis of executable harder.☆45Sep 6, 2021Updated 4 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆140Sep 12, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 5 years ago
- ☆57Mar 25, 2024Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆305Sep 7, 2023Updated 2 years ago
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 8 months ago
- ☆82Mar 11, 2026Updated last month
- ☆345Nov 10, 2025Updated 5 months ago
- ☆39Feb 26, 2025Updated last year
- Mythic Scripting PyPi package - mythic☆29Oct 10, 2025Updated 6 months ago
- abusing misconfiguration for AD with LAPS☆11Jan 25, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆139Dec 7, 2025Updated 4 months ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆18Jun 6, 2025Updated 10 months ago
- C# project to create or modify existing LNKs☆54Oct 18, 2022Updated 3 years ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆281Apr 17, 2023Updated 3 years ago