RayRRT / Active-Directory-Certificate-Services-abuse
☆45Updated 2 years ago
Alternatives and similar repositories for Active-Directory-Certificate-Services-abuse:
Users that are interested in Active-Directory-Certificate-Services-abuse are comparing it to the libraries listed below
- Secretsdump C# version only supporting local (live) operation☆50Updated last year
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆31Updated 2 years ago
- ☆79Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆54Updated 3 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆79Updated 3 years ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆14Updated 2 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆54Updated 2 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆106Updated 10 months ago
- C# havoc implant☆98Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆92Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆45Updated 2 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- .NET deserialization hunter☆76Updated 7 months ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆76Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- To audit the security of read-only domain controllers☆114Updated last year
- ☆54Updated 3 months ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆108Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆50Updated 3 years ago
- ☆95Updated last year
- Adversary Emulation Framework☆82Updated 7 months ago
- Get SYSTEM via SeDebugPrivilege☆19Updated 2 years ago
- SAM Dumping in C#☆43Updated last month
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆71Updated 10 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated last year