TarlogicSecurity / kerbrute
An script to perform kerberos bruteforcing by using impacket
☆444Updated 2 years ago
Alternatives and similar repositories for kerbrute:
Users that are interested in kerbrute are comparing it to the libraries listed below
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆524Updated 2 years ago
- Active Directory ACL exploitation with BloodHound☆716Updated 3 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆765Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,072Updated 4 years ago
- Kerberoast attack -pure python-☆426Updated last year
- Windows Local Privilege Escalation from Service Account to System☆762Updated 5 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆602Updated 6 months ago
- Kerberoast with ACL abuse capabilities☆420Updated 2 months ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆600Updated 4 years ago
- A (partial) Python rewriting of PowerSploit's PowerView☆955Updated 3 weeks ago
- Python version of the C# tool for "Shadow Credentials" attacks☆681Updated 2 weeks ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆514Updated 2 years ago
- ☆214Updated 4 years ago
- Standalone binaries for Linux/Windows of Impacket's examples☆726Updated last year
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆369Updated 3 years ago
- ☆657Updated last month
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆264Updated last year
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆353Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆749Updated last year
- Active Directory Integrated DNS dumping by any authenticated user☆980Updated 3 months ago
- ☆763Updated 2 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆858Updated 4 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆999Updated 5 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,127Updated 4 years ago
- NTLMv1 Multitool☆605Updated this week
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆274Updated last year
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆302Updated 2 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆822Updated 3 years ago
- Bypass for PowerShell Constrained Language Mode☆381Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆222Updated 3 years ago