ar0x4 / DockPilerLinks
☆18Updated last month
Alternatives and similar repositories for DockPiler
Users that are interested in DockPiler are comparing it to the libraries listed below
Sorting:
- Python tool to automatically perform SPN-less RBCD attacks.☆112Updated 3 weeks ago
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆42Updated 2 months ago
- ☆18Updated 5 months ago
- C++ Reflective Assembly Loader☆30Updated 10 months ago
- The DCERPC only printerbug.py version☆196Updated 3 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆146Updated 6 months ago
- ☆158Updated 8 months ago
- Dump Kerberos tickets☆44Updated 5 months ago
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆28Updated 5 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆147Updated 3 weeks ago
- Tool for Active Directory Certificate Services enumeration and abuse☆162Updated 9 months ago
- ☆29Updated last year
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆15Updated 2 weeks ago
- Azure Post Exploitation Framework☆244Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated 2 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆213Updated 2 weeks ago
- ☆120Updated 8 months ago
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆50Updated 3 months ago
- Open Source Implementation of Cobalt Strike's Malleable C2☆70Updated this week
- Impacket pre-compiled binaries☆18Updated 2 years ago
- ☆106Updated 3 months ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆164Updated 2 weeks ago
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆200Updated 3 weeks ago
- Proof of concept for Kerberos Armoring abuse.☆75Updated last month
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆111Updated 5 months ago
- ☆163Updated 7 months ago
- Parses Snaffler output file and generate beautified outputs.☆132Updated 3 weeks ago
- ☆94Updated last year
- 🧠 The ultimate, community-curated resource for Beacon Object Files (BOFs) — tutorials, how-tos, deep dives, and reference materials.☆95Updated last month
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Updated 9 months ago