Yeeb1 / SharpLansweeperDecryptLinks
Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.
☆37Updated 6 months ago
Alternatives and similar repositories for SharpLansweeperDecrypt
Users that are interested in SharpLansweeperDecrypt are comparing it to the libraries listed below
Sorting:
- ☆50Updated 7 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆47Updated 6 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated last year
- ☆55Updated 4 months ago
- ☆45Updated 2 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆17Updated last week
- Enumerate Domain Users Without Authentication☆36Updated 2 months ago
- ☆24Updated 8 months ago
- Impacket pre-compiled binaries☆16Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆115Updated 2 months ago
- ☆38Updated 4 months ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 3 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆28Updated 5 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆32Updated 3 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆36Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- A python script that automates a C2 Profile build☆42Updated 2 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 6 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆37Updated 2 months ago
- Sniffing files generator☆58Updated 3 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆43Updated last month
- ☆44Updated 11 months ago
- A community-driven collection of BloodHound queries☆37Updated this week
- Source code and examples for PassiveAggression☆61Updated last year
- Lifetime AMSI bypass.☆35Updated 2 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- ☆137Updated last month
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆50Updated 3 weeks ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 11 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆29Updated 2 months ago