Wh04m1001 / Random
Random
☆32Updated 2 years ago
Alternatives and similar repositories for Random:
Users that are interested in Random are comparing it to the libraries listed below
- Python3 rewrite of AsOutsider features of AADInternals☆40Updated 2 months ago
- ☆71Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 3 years ago
- ☆85Updated 2 years ago
- ☆56Updated 3 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 5 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆73Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆26Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 7 months ago
- ☆47Updated 2 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆71Updated 9 months ago
- A VSCode devcontainer for development of COFF files with batteries included.☆47Updated last year
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆78Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆61Updated 3 years ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated 2 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- ☆43Updated 7 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆54Updated 2 years ago
- Get Fine Grained Password Policy☆67Updated 9 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 7 months ago
- ☆58Updated last year
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆14Updated 2 years ago
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Updated 7 months ago