Continuous kerberoast monitor
☆45Aug 24, 2023Updated 2 years ago
Alternatives and similar repositories for kerbmon
Users that are interested in kerbmon are comparing it to the libraries listed below
Sorting:
- ☆39Jul 29, 2021Updated 4 years ago
- Lookup for interesting stuff in SMB shares☆150Jun 16, 2023Updated 2 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 4 years ago
- Silencing Sysmon via driver unload☆235Oct 13, 2022Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- Userland API Unhooker Project☆111Jun 14, 2021Updated 4 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- A "no frills" 1 class-only, C# .NET command line parser with support for - and / args, switches only, and Name : Values☆34Jan 20, 2026Updated last month
- Parse NTLM challenge messages over HTTP and SMB☆151Nov 10, 2022Updated 3 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- RDPThief donut shellcode inject into mstsc☆88May 24, 2021Updated 4 years ago
- Fast website scraper and wordlist generator☆82May 6, 2025Updated 9 months ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆108Mar 8, 2023Updated 2 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Collection of CobaltStrike beacon object files☆105Feb 14, 2022Updated 4 years ago
- ☆170May 20, 2021Updated 4 years ago
- Obtain and parse SSL certificates☆86Nov 19, 2021Updated 4 years ago
- A Basic Java Application Vulnerable to the Log4Shell RCE☆42Aug 1, 2023Updated 2 years ago
- Nim version of MDSec's Parallel Syscall PoC☆123Jan 14, 2022Updated 4 years ago
- DInvisibleRegistry☆82Nov 20, 2020Updated 5 years ago
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆90Sep 30, 2024Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Aug 25, 2021Updated 4 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Mar 5, 2020Updated 5 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆193Sep 29, 2021Updated 4 years ago
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 2 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- Enumerate Domain Data☆336Sep 13, 2023Updated 2 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Jul 8, 2022Updated 3 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago