RayRRT / Active-Directory-Certificate-Services-abuse
☆44Updated 2 years ago
Alternatives and similar repositories for Active-Directory-Certificate-Services-abuse:
Users that are interested in Active-Directory-Certificate-Services-abuse are comparing it to the libraries listed below
- Secretsdump C# version only supporting local (live) operation☆48Updated last year
- ☆77Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆13Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆92Updated last year
- C# havoc implant☆96Updated last year
- Library of BOFs to interact with SQL servers☆155Updated last month
- Tool to bypass LSA Protection (aka Protected Process Light)☆44Updated 3 weeks ago
- Get SYSTEM via SeDebugPrivilege☆18Updated 2 years ago
- Automating payload generation for OSEP labs and exam.☆34Updated 2 years ago
- ☆89Updated 2 years ago
- CVE-2024-40711-exp☆38Updated 3 months ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆75Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆80Updated 2 years ago
- Execute commands in other Sessions☆84Updated 6 months ago
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆29Updated last year
- To audit the security of read-only domain controllers☆114Updated last year
- ☆94Updated last year
- Run Cobalt Strike BOFs in Brute Ratel C4!☆61Updated 3 weeks ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆125Updated 10 months ago
- ☆61Updated 2 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 4 months ago
- ☆27Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆71Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆65Updated 2 weeks ago
- ☆92Updated 11 months ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆54Updated 4 years ago
- Beacon Object Files (not Buffer Overflows)☆53Updated last year
- ☆139Updated 2 years ago