citronneur / kerlab
Kerberos laboratory to better understand and then detecting attack on kerberos
☆68Updated 3 years ago
Alternatives and similar repositories for kerlab:
Users that are interested in kerlab are comparing it to the libraries listed below
- Harvis is designed to automate your C2 Infrastructure.☆105Updated 2 years ago
- A little scanner to check the LDAP Signing state☆46Updated 3 years ago
- ☆42Updated 2 years ago
- MSBuild without MSbuild.exe☆129Updated 4 years ago
- Zoom Persistence Aggressor and Handler☆54Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆112Updated 3 years ago
- juicypotato for win10 > 1803 & win server 2019☆96Updated 3 years ago
- Service Enumeration C# .NET Assembly☆60Updated 3 years ago
- Yet another LSASS dumper☆76Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Updated 3 years ago
- ☆92Updated 3 years ago
- PoC to interact with local/remote registry hives through WMI☆85Updated 4 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆57Updated 5 years ago
- ☆56Updated 4 years ago
- Checks for signature requirements over LDAP☆96Updated 2 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆122Updated 3 years ago
- ☆35Updated 2 years ago
- A little tool to play with Kerberos.☆66Updated last year
- Modified version of Pypykatz to print encrypted credentials☆51Updated 2 years ago
- subTee gists code backups☆37Updated 7 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago
- ☆70Updated 3 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Updated 2 years ago
- ☆70Updated 4 years ago
- AMSI Bypass Via the Heap☆105Updated 4 years ago
- A BOF port of the research of @thefLinkk and @codewhitesec☆97Updated 3 years ago
- ☆66Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆60Updated 3 years ago