☆247May 19, 2025Updated 10 months ago
Alternatives and similar repositories for BadSuccessor
Users that are interested in BadSuccessor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆397Sep 26, 2025Updated 6 months ago
- ☆234Oct 8, 2024Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆378Oct 14, 2025Updated 5 months ago
- ☆120May 29, 2025Updated 10 months ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ForsHops☆153Mar 25, 2025Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆56Jul 13, 2025Updated 8 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆640May 8, 2025Updated 10 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆202Nov 4, 2025Updated 4 months ago
- ☆219Mar 26, 2024Updated 2 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆216Oct 19, 2024Updated last year
- ☆165May 5, 2025Updated 10 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆296Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- ☆160Apr 17, 2024Updated last year
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 11 months ago
- ☆245May 5, 2024Updated last year
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Feb 25, 2025Updated last year
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆200Jun 17, 2025Updated 9 months ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆586Mar 19, 2024Updated 2 years ago
- TokenCert☆102Nov 15, 2024Updated last year
- Dump NTDS with golden certificates and UnPAC the hash☆648Mar 20, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆702May 7, 2025Updated 10 months ago
- Timeroasting scripts by Tom Tervoort☆388Nov 11, 2025Updated 4 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆373Jan 29, 2026Updated 2 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆347Nov 19, 2024Updated last year
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆174Sep 3, 2025Updated 6 months ago
- Tool to remotely dump secrets from the Windows registry☆526Feb 27, 2026Updated last month
- Tool for viewing NTDS.dit☆197Mar 14, 2025Updated last year
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 8 months ago
- A small How-To on creating your own weaponized WSL file☆124Jul 23, 2025Updated 8 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆78Dec 23, 2023Updated 2 years ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆262Feb 21, 2025Updated last year
- Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive an…☆1,111Mar 16, 2026Updated 2 weeks ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆168Jan 23, 2026Updated 2 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆165Apr 17, 2025Updated 11 months ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆117Aug 21, 2024Updated last year