Shac0x / WonkaLinks
Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but for security research and penetration testing! π«
β164Updated 3 months ago
Alternatives and similar repositories for Wonka
Users that are interested in Wonka are comparing it to the libraries listed below
Sorting:
- β159Updated 9 months ago
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.β205Updated last month
- Tool to extract username and password of current user from PanGPA in plaintextβ89Updated last year
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analysβ¦β95Updated last week
- Dominate the domain. Relay to royalty.β165Updated last week
- Local SYSTEM auth trigger for relayingβ168Updated 6 months ago
- The DCERPC only printerbug.py versionβ201Updated 3 months ago
- β57Updated 11 months ago
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk readsβ238Updated 3 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCSβ150Updated last year
- A C# utility for interacting with SCOMβ95Updated 2 months ago
- β161Updated 3 months ago
- Advanced In-Memory PowerShell Process Injection Frameworkβ72Updated 6 months ago
- Living off the land searches for explorer and sharepointβ92Updated 2 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA β¦β163Updated 3 months ago
- Permanently disable EDRs as local adminβ125Updated last month
- A Python POC for CRED1 over SOCKS5β164Updated last year
- β50Updated 10 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijackingβ136Updated 7 months ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)β128Updated 3 months ago
- A tool to play with scheduled tasks on Windows, in Rustβ121Updated 3 months ago
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.β148Updated 2 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirectionβ45Updated 2 years ago
- The Azure Execution Toolβ83Updated this week
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets β¦β151Updated last month
- Adversary Emulation Frameworkβ129Updated 7 months ago
- SCEP request tool for AD CS and Intuneβ73Updated 3 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.β101Updated last month
- β198Updated 10 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to β¦β34Updated 4 months ago