☆56Sep 13, 2022Updated 3 years ago
Alternatives and similar repositories for Active-Directory-Certificate-Services-abuse
Users that are interested in Active-Directory-Certificate-Services-abuse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Nov 23, 2021Updated 4 years ago
- ☆39Feb 26, 2026Updated last month
- ☆20Sep 6, 2025Updated 6 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆347Nov 19, 2024Updated last year
- ☆100Sep 1, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- Windows AppLocker Driver (appid.sys) LPE☆76Jul 29, 2024Updated last year
- ☆234Oct 8, 2024Updated last year
- 一个普通的BOF用来BypassUAC☆22Apr 6, 2024Updated last year
- Local SYSTEM auth trigger for relaying☆171Jul 22, 2025Updated 8 months ago
- Aggressor script add-in for CobaltStrike to track file uploads☆48Nov 7, 2022Updated 3 years ago
- Simple windows rpc server for research purposes only☆82May 29, 2022Updated 3 years ago
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆15Aug 17, 2023Updated 2 years ago
- Local Privilege Escalation Affecting Millions of Gaming Laptops☆62Jan 19, 2026Updated 2 months ago
- Cobalt Strike random C2 Profile generator☆16Mar 4, 2026Updated 3 weeks ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆426Feb 11, 2024Updated 2 years ago
- One WSL BOF to rule them all☆165Jan 14, 2026Updated 2 months ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Sep 6, 2021Updated 4 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆140Sep 12, 2022Updated 3 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Mythic Scripting PyPi package - mythic☆29Oct 10, 2025Updated 5 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆304Sep 7, 2023Updated 2 years ago
- ☆57Mar 25, 2024Updated 2 years ago
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 8 months ago
- ☆81Mar 11, 2026Updated 2 weeks ago
- ☆342Nov 10, 2025Updated 4 months ago
- ☆39Feb 26, 2025Updated last year
- abusing misconfiguration for AD with LAPS☆11Jan 25, 2024Updated 2 years ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆138Dec 7, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆18Jun 6, 2025Updated 9 months ago
- C# project to create or modify existing LNKs☆54Oct 18, 2022Updated 3 years ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated 2 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆279Apr 17, 2023Updated 2 years ago