awakecoding / wireshark-rdp
Wireshark RDP resources
☆203Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for wireshark-rdp
- ☆294Updated 3 weeks ago
- Some scripts to abuse kerberos using Powershell☆313Updated last year
- An ADCS honeypot to catch attackers in your internal network.☆226Updated 4 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆221Updated 3 months ago
- ☆169Updated last month
- ☆130Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆309Updated 7 months ago
- Different methods to get current username without using whoami☆172Updated 9 months ago
- ☆103Updated 9 months ago
- ☆181Updated 10 months ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆176Updated 3 months ago
- Microsoft Signed PowerShell scripts☆212Updated last year
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆209Updated 3 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 5 months ago
- Active Directory delegation management tool☆284Updated last year
- Tools for interacting with authentication packages using their individual message protocols☆298Updated 3 weeks ago
- A collection of tools, scripts and personal research☆113Updated 4 months ago
- ☆188Updated 3 weeks ago
- ☆180Updated 2 months ago
- ☆267Updated last year
- An interactive shell to spoof some LOLBins command line☆180Updated 9 months ago
- Azure DevOps Services Attack Toolkit☆260Updated 3 months ago
- Ask a TGS on behalf of another user without password☆465Updated 3 months ago
- ☆127Updated 3 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆301Updated last year
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆91Updated 2 months ago
- ☆280Updated 11 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆174Updated 10 months ago