Yeeb1 / SharpLansweeperDecrypt
Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.
☆37Updated 4 months ago
Alternatives and similar repositories for SharpLansweeperDecrypt:
Users that are interested in SharpLansweeperDecrypt are comparing it to the libraries listed below
- ☆40Updated 2 weeks ago
- Python3 rewrite of AsOutsider features of AADInternals☆43Updated 3 months ago
- Source code and examples for PassiveAggression☆55Updated 10 months ago
- ☆54Updated last month
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 10 months ago
- ☆49Updated 5 months ago
- ☆43Updated 9 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆25Updated 3 months ago
- A C# project that builds a Web Applciation which redirects all HTTPS☆24Updated 2 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 9 months ago
- Impacket pre-compiled binaries☆15Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 4 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆30Updated last month
- A python script that automates a C2 Profile build☆35Updated 2 weeks ago
- ☆33Updated 2 months ago
- ☆37Updated last month
- Lifetime AMSI bypass.☆35Updated 9 months ago
- Enumerate Domain Users Without Authentication☆30Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆113Updated 2 weeks ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- Situational Awareness script to identify how and where to run implants☆49Updated 4 months ago
- Tool to aid in dumping LSASS process remotely☆38Updated 8 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆55Updated 4 months ago
- Impersonate Tokens using only NTAPI functions☆30Updated last week
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated last year
- Dumping LSASS Evaded Endpoint Security Solutions☆12Updated last month
- Enumerate the Domain for Readable and Writable Shares☆17Updated last month
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- ☆54Updated 5 months ago