citronneur / kerlab
Kerberos laboratory to better understand and then detecting attack on kerberos
☆69Updated 3 years ago
Alternatives and similar repositories for kerlab:
Users that are interested in kerlab are comparing it to the libraries listed below
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- A little scanner to check the LDAP Signing state☆46Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 2 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆124Updated 3 years ago
- ☆56Updated 4 years ago
- AMSI Bypass Via the Heap☆107Updated 4 years ago
- PoC to interact with local/remote registry hives through WMI☆85Updated 4 years ago
- Service Enumeration C# .NET Assembly☆58Updated 3 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆58Updated 6 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆112Updated 3 years ago
- A little tool to play with Kerberos.☆66Updated 2 years ago
- subTee gists code backups☆36Updated 7 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆101Updated 10 months ago
- Yet another LSASS dumper☆76Updated 4 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- MSBuild without MSbuild.exe☆132Updated 4 years ago
- ☆42Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- ☆93Updated 3 years ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- Modified version of Pypykatz to print encrypted credentials☆51Updated 2 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆62Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆101Updated 3 years ago
- ☆35Updated 3 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago
- A technique for Active Directory domain persistence☆39Updated last year
- ☆63Updated 3 years ago
- ☆71Updated 4 years ago
- ☆70Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆143Updated 4 years ago