T3KX / Crackmapexec-LAPSView external linksLinks
LAPS module for CrackMapExec
☆29Oct 20, 2021Updated 4 years ago
Alternatives and similar repositories for Crackmapexec-LAPS
Users that are interested in Crackmapexec-LAPS are comparing it to the libraries listed below
Sorting:
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- ☆13Jan 20, 2020Updated 6 years ago
- This is a patched version of ExchangeRelayX☆14Aug 13, 2020Updated 5 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆41Sep 3, 2020Updated 5 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆67Oct 3, 2020Updated 5 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- Crystal Anti-Exploit Protection 2012☆37May 31, 2020Updated 5 years ago
- CVE-2019-1040 with Kerberos delegation☆33Jun 18, 2021Updated 4 years ago
- A Collection of In-Memory Shellcode Execution Techniques for Windows☆152Jul 26, 2019Updated 6 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Some of my flag protected writeups☆11Apr 13, 2020Updated 5 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 5 years ago
- record some AD security and Red Team contents☆14Dec 10, 2019Updated 6 years ago
- C# remote process injection utility for Cobalt Strike☆88Mar 9, 2020Updated 5 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 2 years ago
- ☆14Apr 16, 2022Updated 3 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- A cross-platform implant written in Nim☆175Mar 6, 2024Updated last year
- WSUS Unauthenticated RCE☆170Oct 28, 2025Updated 3 months ago