bodik / awesome-potatoesLinks
Study notes on Windows NTLM Reflection and token stealing based EOPs.
☆18Updated 4 years ago
Alternatives and similar repositories for awesome-potatoes
Users that are interested in awesome-potatoes are comparing it to the libraries listed below
Sorting:
- Perform Windows domain enumeration via LDAP☆37Updated 3 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- c# reverse shell poc☆27Updated 6 years ago
- Tool for efficient directory enumeration☆65Updated last year
- Basic Dart reverse shell code☆21Updated last year
- Presentaciones de congresos☆53Updated last year
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- ☆43Updated 3 years ago
- A tool to abuse Exchange services☆12Updated last year
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 5 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Updated 3 years ago
- Exchangelib wrapper for pentesting☆66Updated 8 months ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Updated 4 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 4 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Updated 5 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Checks for signature requirements over LDAP☆98Updated 3 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆98Updated last year
- Finding SSL Blindspots for Red Teams☆33Updated 5 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- A port of classic netcat to C#☆32Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago