XiaoliChan / PetitPotam-V2
More EFS coerced authentication method with PetitPotam.py
☆22Updated last year
Alternatives and similar repositories for PetitPotam-V2:
Users that are interested in PetitPotam-V2 are comparing it to the libraries listed below
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 2 years ago
- ☆45Updated 6 months ago
- resource-based constrained delegation RBCD☆43Updated 3 years ago
- CrackMapExec extension module/protocol support☆41Updated last year
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- dump lsass tool☆39Updated 2 years ago
- ☆21Updated last year
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆38Updated last year
- ☆30Updated last year
- 利用RPC服务,内网批量探测Windows出网☆14Updated 2 years ago
- dump lsass☆37Updated 2 years ago
- Golang implement winrm client with pass the hash☆30Updated 8 months ago
- query specific user and login IP from remote machine☆17Updated 2 years ago
- Cs-Sleep-Mask-Fiber☆17Updated 4 months ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆19Updated 9 months ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆44Updated last year
- 一个普通的BOF用来BypassUAC☆17Updated 9 months ago
- AD Pentest Cheatsheet by BlackWasp☆21Updated 2 years ago
- ☆39Updated last year
- Beacon Object File implementation of pwn1sher's KillDefender☆65Updated 2 years ago
- MSSQL CLR for pentest.☆54Updated last year
- ☆22Updated 2 years ago
- command execute without 445 port☆51Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Updated last year
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Updated 2 years ago
- 通过ptr记录使用ip反查内网域名☆17Updated 4 months ago
- ☆15Updated last year
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆32Updated last year