RedTeamPentesting / kbtlsLinks
Establishes mutually trusted TLS connections based on a pre-shared connection key.
☆51Updated last year
Alternatives and similar repositories for kbtls
Users that are interested in kbtls are comparing it to the libraries listed below
Sorting:
- Dump Kerberos tickets from the KCM database of SSSD☆55Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Updated 11 months ago
- ☆44Updated last year
- ☆56Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Updated 3 years ago
- ☆53Updated 2 years ago
- ☆31Updated 3 years ago
- Discord C2 Profile for Mythic☆33Updated 11 months ago
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆84Updated 2 years ago
- Abuse Azure API permissions for red teaming☆71Updated 3 years ago
- Docker container for running CobaltStrike 4.10☆38Updated last year
- Java archive implant toolkit.☆61Updated 9 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Bash and ZSH integration for Impacket☆73Updated 3 months ago
- Tool to aid in dumping LSASS process remotely☆42Updated 4 months ago
- Impacket is a collection of Python classes for working with network protocols.☆31Updated last year
- Microsoft Graph API post-exploitation toolkit☆95Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Validates priv escalation of AD trusts☆48Updated 10 months ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 3 years ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Updated 10 months ago
- Source code and examples for PassiveAggression☆64Updated last year
- Golang search engine scraper intended for identification of published ClickOnce deployments☆93Updated last year
- Duplicate not owned Token from Running Process☆74Updated 2 years ago
- ☆29Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆82Updated 3 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆89Updated 2 months ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Updated last year