RayRRT / Active-Directory-Certificate-Services-abuse
☆48Updated 2 years ago
Alternatives and similar repositories for Active-Directory-Certificate-Services-abuse:
Users that are interested in Active-Directory-Certificate-Services-abuse are comparing it to the libraries listed below
- ☆83Updated last year
- Secretsdump C# version only supporting local (live) operation☆49Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆111Updated this week
- To audit the security of read-only domain controllers☆115Updated last year
- C# havoc implant☆100Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆54Updated 3 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆47Updated last month
- ☆104Updated last month
- Execute commands in other Sessions☆85Updated 8 months ago
- .NET deserialization hunter☆76Updated 8 months ago
- ☆62Updated 2 years ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆118Updated last month
- ☆88Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- Lateral Movement via the .NET Profiler☆79Updated 4 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆118Updated 5 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆81Updated 2 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆128Updated last year
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆15Updated 2 years ago
- ☆78Updated 8 months ago
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆32Updated 2 years ago
- Library of BOFs to interact with SQL servers☆158Updated 3 months ago
- Lateral Movement☆122Updated last year
- Simple BOF to read the protection level of a process☆115Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆91Updated 2 years ago
- ☆51Updated 2 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆47Updated 3 months ago
- Lsass dumper evading (some) EDR detection☆22Updated last month