TarlogicSecurity / tickey
Tool to extract Kerberos tickets from Linux kernel keys.
☆226Updated 5 years ago
Alternatives and similar repositories for tickey:
Users that are interested in tickey are comparing it to the libraries listed below
- lateral movement techniques that can be used during red team exercises☆271Updated 5 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆327Updated 5 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆167Updated 2 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆248Updated 4 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆178Updated 2 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆204Updated 4 years ago
- Dll that can be used for side loading and other attack vector.☆202Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆256Updated 3 years ago
- Python based BloodHound data importer☆147Updated last year
- Presentation material presented by Outflank team members at public events.☆187Updated 4 months ago
- Kerberos manipulation library in pure Python☆268Updated 2 months ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆168Updated 4 years ago
- Parse NTLM challenge messages over HTTP and SMB☆146Updated 2 years ago
- .NET 4.0 Console App to browse VMDK / VHD images and extract files☆192Updated 4 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆133Updated last year
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆184Updated 3 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆532Updated 2 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆415Updated 2 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆202Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆232Updated 3 years ago
- ☆191Updated 5 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆236Updated 4 years ago
- A curated list of awesome BloodhoundAD resources☆230Updated 2 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆187Updated 3 years ago
- Dumping LAPS from Python☆268Updated 2 years ago
- ☆351Updated last year
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆216Updated 4 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆144Updated 3 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆220Updated 4 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago