Format SSSD Raw Kerberos Payloads into CCACHE files for use on Windows systems
☆42May 26, 2021Updated 4 years ago
Alternatives and similar repositories for KCMTicketFormatter
Users that are interested in KCMTicketFormatter are comparing it to the libraries listed below
Sorting:
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- ☆59Aug 11, 2023Updated 2 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 7 months ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 8 months ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Jan 11, 2026Updated last month
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- AWS Backup implementation in terraform☆13Feb 8, 2020Updated 6 years ago
- Metasploit Framework☆11Sep 5, 2017Updated 8 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- A capture-the-flag exercise based on data analysis challenges☆19Jan 30, 2020Updated 6 years ago
- SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and s…☆63Sep 2, 2020Updated 5 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- Utilities for Pentesting with BloodHound☆22Feb 20, 2026Updated last week
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last week
- ☆15Feb 1, 2019Updated 7 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- REST API client to consume w3af☆17May 22, 2023Updated 2 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- Sniffs sensitive data from interface or pcap☆14Feb 19, 2018Updated 8 years ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 3 months ago
- ☆57Jan 28, 2024Updated 2 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Sep 16, 2025Updated 5 months ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 4 years ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- ☆27May 6, 2024Updated last year
- ☆21Sep 23, 2025Updated 5 months ago
- ☆59Oct 24, 2024Updated last year
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- ☆99Sep 15, 2025Updated 5 months ago
- ☆53Oct 20, 2020Updated 5 years ago