bitsadmin / dir2json
Tool for efficient directory enumeration
☆56Updated 6 months ago
Alternatives and similar repositories for dir2json:
Users that are interested in dir2json are comparing it to the libraries listed below
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆55Updated 3 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- ☆49Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆63Updated 4 months ago
- Get Fine Grained Password Policy☆70Updated 3 weeks ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆40Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆66Updated 3 weeks ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆35Updated 2 years ago
- .NET project for installing Persistence☆64Updated 3 years ago
- ☆88Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 7 months ago
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- Secretsdump C# version only supporting local (live) operation☆49Updated 2 weeks ago
- PoC-Malware-TTPs☆49Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- ☆86Updated last year
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆134Updated 7 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆57Updated 4 months ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- ☆62Updated 2 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆55Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆35Updated last year
- C# havoc implant☆99Updated 2 years ago
- Windows Persistence Toolkit in C#☆36Updated 2 years ago