Sq00ky / SMB-Session-Spoofing
☆121Updated last year
Alternatives and similar repositories for SMB-Session-Spoofing:
Users that are interested in SMB-Session-Spoofing are comparing it to the libraries listed below
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- ☆96Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆89Updated 10 months ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Bypassing AppLocker with C#☆138Updated 3 years ago
- ☆68Updated 4 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆152Updated 2 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 3 years ago
- ☆116Updated last year
- Weaponising C# - Fundamentals Training Content☆70Updated 3 years ago
- ☆158Updated 4 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆252Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆119Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated last year
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆100Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 2 years ago
- OPSEC safe Kerberoasting in C#☆190Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆80Updated 3 years ago
- Get Fine Grained Password Policy☆68Updated 10 months ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago
- Shellcode generation and encoding utility☆21Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 3 months ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆102Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆106Updated last month
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆121Updated 3 years ago
- Simple tool to perform HTML Smuggling.☆67Updated 3 years ago