awakecoding / wireshark-rdp
Wireshark RDP resources
☆203Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for wireshark-rdp
- ☆293Updated 2 weeks ago
- Active Directory delegation management tool☆283Updated last year
- ☆181Updated 9 months ago
- ☆169Updated 3 weeks ago
- An ADCS honeypot to catch attackers in your internal network.☆222Updated 4 months ago
- ☆147Updated last year
- A collection of tools, scripts and personal research☆111Updated 4 months ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆176Updated 2 months ago
- ☆187Updated 2 weeks ago
- Some scripts to abuse kerberos using Powershell☆312Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆306Updated 7 months ago
- ☆130Updated last year
- Tools for interacting with authentication packages using their individual message protocols☆296Updated last week
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆91Updated 2 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆218Updated 3 months ago
- Scan vulnerable drivers on Windows with loldrivers.io☆162Updated last year
- Python tool to check rootkits in Windows kernel☆165Updated 3 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆144Updated this week
- ☆101Updated 9 months ago
- Abusing Intune for Lateral Movement over C2☆272Updated last week
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆115Updated 7 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆105Updated last month
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆151Updated last month
- DNS Tunneling using powershell to download and execute a payload. Works in CLM.☆218Updated 2 years ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆300Updated last year
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆308Updated 3 weeks ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆174Updated 10 months ago
- Microsoft Signed PowerShell scripts☆212Updated last year