pyForgeCert is a Python equivalent of the ForgeCert.
☆69Aug 15, 2023Updated 2 years ago
Alternatives and similar repositories for pyForgeCert
Users that are interested in pyForgeCert are comparing it to the libraries listed below
Sorting:
- ADCS abuser☆314Feb 6, 2023Updated 3 years ago
- CVE-2019-1040 with Kerberos delegation☆33Jun 18, 2021Updated 4 years ago
- ☆181Feb 3, 2021Updated 5 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- "Golden" certificates☆710Aug 17, 2024Updated last year
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆183Aug 4, 2021Updated 4 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆166Sep 10, 2021Updated 4 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- ☆477Nov 20, 2022Updated 3 years ago
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- .NET 4.0 WinRM API Command Execution☆166Sep 11, 2020Updated 5 years ago
- ☆53Sep 16, 2021Updated 4 years ago
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆197Feb 1, 2021Updated 5 years ago
- ☆133Dec 19, 2020Updated 5 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆41Aug 6, 2021Updated 4 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆193Jul 7, 2021Updated 4 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- ☆199Aug 28, 2025Updated 6 months ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Load .net assemblies from memory while having them appear to be loaded from an on-disk location.☆173May 5, 2021Updated 4 years ago
- ☆94May 14, 2022Updated 3 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆425Jul 27, 2022Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆312Nov 29, 2023Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆90Feb 16, 2022Updated 4 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆269Mar 18, 2021Updated 4 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆195Jun 30, 2019Updated 6 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- ☆415Apr 28, 2021Updated 4 years ago
- A shellcode function to encrypt a running process image when sleeping.☆340Sep 11, 2021Updated 4 years ago
- C# version of Powermad☆170Dec 5, 2023Updated 2 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- C# Clipboard Monitor☆186Apr 2, 2020Updated 5 years ago
- Shellcoding utilities☆225Dec 16, 2020Updated 5 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- Remove API hooks from a Beacon process.☆282Sep 18, 2021Updated 4 years ago