TarlogicSecurity / tickey
Tool to extract Kerberos tickets from Linux kernel keys.
☆219Updated 5 years ago
Alternatives and similar repositories for tickey:
Users that are interested in tickey are comparing it to the libraries listed below
- Parse NTLM challenge messages over HTTP and SMB☆144Updated 2 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆166Updated 2 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆322Updated 5 years ago
- lateral movement techniques that can be used during red team exercises☆269Updated 5 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆203Updated 4 years ago
- LDAP library for auditing MS AD☆404Updated last week
- Linux privilege escalation via LXD☆132Updated 4 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆247Updated 4 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆232Updated 4 years ago
- .NET 4.0 Console App to browse VMDK / VHD images and extract files☆188Updated 4 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆168Updated 4 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆198Updated 6 years ago
- ☆103Updated 4 months ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆254Updated 3 years ago
- ☆189Updated 4 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆183Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆221Updated 3 years ago
- ☆518Updated 2 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆215Updated last year
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆145Updated 4 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆172Updated 6 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆377Updated 5 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆140Updated 3 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆129Updated 11 months ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆176Updated last year
- A curated list of awesome BloodhoundAD resources☆232Updated 2 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆246Updated 2 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆107Updated 2 years ago
- Resources for our Active Directory security workshops☆140Updated 3 years ago