carlospolop / DDexec
☆46Updated 2 years ago
Alternatives and similar repositories for DDexec:
Users that are interested in DDexec are comparing it to the libraries listed below
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- ☆90Updated last month
- Creates and sends fake meeting invite☆58Updated 3 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- Exchangelib wrapper for pentesting☆61Updated last month
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆116Updated 6 months ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆75Updated last year
- ☆121Updated last year
- Pre-compiled builds for CVE-2021-4034☆25Updated 3 years ago
- ☆115Updated 3 years ago
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 3 weeks ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆52Updated 5 months ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- ☆50Updated 2 years ago
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- ☆47Updated this week
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆100Updated 2 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆34Updated 3 years ago
- Posts about different topics☆36Updated last year
- Windows Post-Exploitation tools wrapper☆12Updated 9 months ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated 9 months ago
- A small utility to translate NTDS.dit files to SQLite format.☆72Updated last year
- ☆68Updated 4 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆89Updated 2 years ago
- C# tool to discover low hanging fruits☆92Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago