Shac0x / WonkaLinks
Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but for security research and penetration testing! π«
β147Updated last month
Alternatives and similar repositories for Wonka
Users that are interested in Wonka are comparing it to the libraries listed below
Sorting:
- β152Updated 6 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analysβ¦β91Updated 3 weeks ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA β¦β156Updated last month
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijackingβ133Updated 5 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCSβ150Updated 9 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with itβ127Updated 3 months ago
- The DCERPC only printerbug.py versionβ174Updated last month
- Tool to extract username and password of current user from PanGPA in plaintextβ88Updated 11 months ago
- β49Updated 7 months ago
- Local SYSTEM auth trigger for relayingβ167Updated 4 months ago
- Client-side Encrypted Upload Server Python Scriptβ65Updated 4 months ago
- β57Updated 9 months ago
- SCEP request tool for AD CS and Intuneβ72Updated last month
- Permanently disable EDRs as local adminβ121Updated last month
- Evasive Payload Delivery Server & C2 Redirectorβ112Updated last month
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims β¦β96Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!β98Updated 7 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3β¦β151Updated 4 months ago
- Persist like a Dodderβ66Updated 6 months ago
- Impersonate Tokens using only NTAPI functionsβ83Updated 8 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.β89Updated 10 months ago
- Advanced In-Memory PowerShell Process Injection Frameworkβ71Updated 4 months ago
- A hoontr must hoontβ101Updated last week
- TokenCertβ101Updated last year
- β52Updated last year
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)β119Updated last month
- This technique leverages PowerShell'sΒ .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typβ¦β51Updated 6 months ago
- OAuth Device Code Phishing Toolkitβ94Updated 2 months ago
- Lateral Movement Bof with MSI ODBC Driver Installβ138Updated 2 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.β92Updated this week