Sq00ky / SMB-Session-Spoofing
☆121Updated last year
Alternatives and similar repositories for SMB-Session-Spoofing:
Users that are interested in SMB-Session-Spoofing are comparing it to the libraries listed below
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆172Updated 2 years ago
- ☆117Updated last month
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆138Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆90Updated last year
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- ☆47Updated 3 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆101Updated 2 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆120Updated 4 years ago
- Cortex XDR Config Extractor☆132Updated 2 years ago
- ☆98Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 2 years ago
- C# tool to discover low hanging fruits☆93Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- Get Fine Grained Password Policy☆70Updated 2 weeks ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆256Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- Shellcode generation and encoding utility☆21Updated 2 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- ☆92Updated 2 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆122Updated 3 years ago
- ☆159Updated 5 months ago
- Weaponising C# - Fundamentals Training Content☆70Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆229Updated 3 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆44Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆109Updated 2 years ago