ShutdownRepo / targetedKerberoastLinks
Kerberoast with ACL abuse capabilities
☆573Updated 10 months ago
Alternatives and similar repositories for targetedKerberoast
Users that are interested in targetedKerberoast are comparing it to the libraries listed below
Sorting:
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆341Updated last year
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆689Updated last month
- Just another Powerview alternative but on steroids☆807Updated this week
- Python version of the C# tool for "Shadow Credentials" attacks☆810Updated last month
- Partial python implementation of SharpGPOAbuse☆478Updated last month
- Tools for Kerberos PKINIT and relaying to AD CS☆838Updated 9 months ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆153Updated last year
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆402Updated 12 years ago
- Extracts Key Values from .keytab files☆320Updated 5 years ago
- In-depth ldap enumeration utility☆532Updated last week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆620Updated last week
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆763Updated 2 weeks ago
- Ad hoc collection of Red Teaming & Active Directory tooling.☆220Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆730Updated 2 years ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆203Updated 7 months ago
- Timeroasting scripts by Tom Tervoort☆365Updated 4 months ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆110Updated 7 years ago
- Multiplayer pivoting solution☆450Updated 2 months ago
- Powershell script to extract information from boot PXE☆149Updated 6 years ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆650Updated 5 years ago
- ☆220Updated 5 years ago
- ☆733Updated 9 months ago
- ☆805Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆938Updated 2 years ago
- ☆281Updated 3 years ago
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆149Updated 2 months ago
- Dumping LAPS from Python☆280Updated 2 years ago
- ☆166Updated 2 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆913Updated 11 months ago
- AD ACL abuse☆350Updated last month