Yeeb1 / SharpLansweeperDecrypt
Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.
☆35Updated 2 months ago
Alternatives and similar repositories for SharpLansweeperDecrypt:
Users that are interested in SharpLansweeperDecrypt are comparing it to the libraries listed below
- Source code and examples for PassiveAggression☆55Updated 8 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆22Updated last month
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆104Updated 10 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆40Updated 2 months ago
- Impacket pre-compiled binaries☆15Updated last year
- ☆48Updated 3 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 8 months ago
- ☆43Updated 7 months ago
- Sniffing files generator☆52Updated 3 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 7 months ago
- Brief writeup of post exploitation methodologies.☆17Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Enumerate Domain Users Without Authentication☆30Updated last month
- Situational Awareness script to identify how and where to run implants☆45Updated 2 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 10 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆30Updated 2 months ago
- Lifetime AMSI bypass.☆35Updated 7 months ago
- ☆64Updated 11 months ago
- in-process powershell runner for BRC4☆44Updated last year
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated 11 months ago
- ☆52Updated 3 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆73Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆139Updated 4 months ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆14Updated 2 years ago
- Enumerate the Domain for Readable and Writable Shares☆16Updated this week