Semperis / GoldenGMSALinks
GolenGMSA tool for working with GMSA passwords
☆150Updated last year
Alternatives and similar repositories for GoldenGMSA
Users that are interested in GoldenGMSA are comparing it to the libraries listed below
Sorting:
- ☆151Updated 3 months ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆122Updated 3 years ago
- ☆159Updated 6 months ago
- ☆247Updated last year
- OPSEC safe Kerberoasting in C#☆191Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆175Updated 2 years ago
- Collection of tools to use with Azure Applications☆108Updated last year
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- ☆91Updated 4 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆320Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆94Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆137Updated last year
- Hybrid AD utilities for ROADtools☆74Updated last week
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆177Updated 2 years ago
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆127Updated 3 years ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 4 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆93Updated last year
- Beacon Object File & C# project to check LDAP signing☆189Updated 9 months ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆220Updated 4 years ago
- Azure AD cheatsheet for the CARTP course☆116Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Updated 3 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆139Updated 10 months ago
- ☆37Updated last year
- Powershell version of SharpGPOAbuse☆78Updated 4 years ago
- Koppeling x Metatwin x LazySign☆210Updated 3 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆256Updated 2 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆100Updated 3 years ago