akamai / DDSpoofLinks
DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.
☆126Updated last year
Alternatives and similar repositories for DDSpoof
Users that are interested in DDSpoof are comparing it to the libraries listed below
Sorting:
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆201Updated 8 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆139Updated 10 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆166Updated last month
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆310Updated 7 months ago
- ☆118Updated 2 months ago
- ☆206Updated last year
- ☆219Updated 8 months ago
- A small utility to translate NTDS.dit files to SQLite format.☆76Updated last year
- psexecsvc - a python implementation of PSExec's native service implementation☆202Updated 4 months ago
- Tool for viewing NTDS.dit☆169Updated 3 months ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆209Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆305Updated 7 months ago
- ☆160Updated 7 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆229Updated 2 months ago
- ☆199Updated 2 weeks ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆249Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆156Updated last year
- Extracting NetNTLM without touching lsass.exe☆238Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆128Updated 5 months ago
- My implementation of the GIUDA project in C++☆184Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆138Updated 10 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆201Updated last year
- Continuous password spraying tool☆189Updated 3 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆175Updated 2 years ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 4 months ago
- ☆159Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆188Updated 8 months ago
- ACL abuse swiss-knife☆124Updated 2 years ago