akamai / akamai-security-researchView external linksLinks
This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.
☆524Jun 10, 2025Updated 8 months ago
Alternatives and similar repositories for akamai-security-research
Users that are interested in akamai-security-research are comparing it to the libraries listed below
Sorting:
- ☆184Dec 16, 2022Updated 3 years ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆286Aug 18, 2021Updated 4 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆675Dec 23, 2022Updated 3 years ago
- ☆385Jan 19, 2023Updated 3 years ago
- Exploring RPC interfaces on Windows☆344Jan 30, 2024Updated 2 years ago
- NTLM relaying for Windows made easy☆579Apr 25, 2023Updated 2 years ago
- a tool used to analyze and monitor in named pipes☆193Oct 27, 2024Updated last year
- DirSync is a simple proof of concept PowerShell module to demonstrate the impact of delegating DS-Replication-Get-Changes and DS-Replicat…☆29Apr 26, 2023Updated 2 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆417Jan 27, 2024Updated 2 years ago
- Framework for Kerberos relaying☆939May 29, 2022Updated 3 years ago
- ☆1,117Jan 6, 2026Updated last month
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆363Dec 19, 2022Updated 3 years ago
- PoCs and tools for investigation of Windows process execution techniques☆952Feb 2, 2026Updated 2 weeks ago
- ☆563Feb 22, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆637May 8, 2025Updated 9 months ago
- Check for LDAP protections regarding the relay of NTLM authentication☆532Nov 19, 2024Updated last year
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,629Aug 6, 2022Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,366Oct 27, 2023Updated 2 years ago
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆590Jan 31, 2025Updated last year
- Coerce Windows machines auth via MS-EVEN☆171Jan 17, 2024Updated 2 years ago
- Aims to identify sleeping beacons☆661Jan 25, 2026Updated 3 weeks ago
- ☆827Sep 9, 2022Updated 3 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆381Dec 13, 2024Updated last year
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- Recovering NTLM hashes from Credential Guard☆378Dec 26, 2022Updated 3 years ago
- COM Hijacking VOODOO☆376Nov 27, 2025Updated 2 months ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Aug 1, 2022Updated 3 years ago
- ☆534Jun 6, 2025Updated 8 months ago
- collect for learning cases☆595Jun 16, 2024Updated last year
- Dumping DPAPI credz remotely☆1,318Mar 24, 2025Updated 10 months ago
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,262Nov 6, 2025Updated 3 months ago
- ☆145Mar 29, 2025Updated 10 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,258Dec 9, 2025Updated 2 months ago
- UAC bypass by abusing RPC and debug objects.☆627Oct 19, 2023Updated 2 years ago
- A tool that shows detailed information about named pipes in Windows☆731Nov 15, 2024Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆358Dec 13, 2025Updated 2 months ago
- ☆836Dec 13, 2022Updated 3 years ago