RedTeamPentesting / kbtlsLinks
Establishes mutually trusted TLS connections based on a pre-shared connection key.
☆50Updated last year
Alternatives and similar repositories for kbtls
Users that are interested in kbtls are comparing it to the libraries listed below
Sorting:
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 10 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆31Updated 4 months ago
- Validates priv escalation of AD trusts☆45Updated 3 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- ☆44Updated last year
- Discord C2 Profile for Mythic☆30Updated 4 months ago
- ☆52Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 4 months ago
- ☆54Updated 7 months ago
- Impacket is a collection of Python classes for working with network protocols.☆28Updated last year
- ☆31Updated 2 years ago
- ☆28Updated 2 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆84Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- Microsoft Graph API post-exploitation toolkit☆94Updated last year
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- Deploy a phishing infrastructure on the fly.☆71Updated 6 months ago
- A PoC for achieving persistence via push notifications on Windows☆46Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- Tool to aid in dumping LSASS process remotely☆40Updated 11 months ago
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆33Updated last year
- ☆50Updated 8 months ago