cnotin / SplunkWhisperer2
Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations
☆243Updated last year
Related projects: ⓘ
- Automating juicy potato local privilege escalation exploit for penetration testers☆138Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆697Updated 2 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆250Updated last year
- Disposable and resilient red team infrastructure with Terraform☆248Updated 5 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆343Updated 3 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆509Updated last year
- An script to perform kerberos bruteforcing by using impacket☆424Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆461Updated 2 months ago
- Collection of things made during my OSCP journey☆250Updated 6 years ago
- A Linux enumeration script for Hack The Box☆188Updated 4 years ago
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆192Updated 3 years ago
- ☆510Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆215Updated 2 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆219Updated 3 years ago
- linikatz is a tool to attack AD on UNIX☆519Updated 11 months ago
- Weaponizing Splunk with reverse and bind shells.☆172Updated 7 years ago
- Changes for Visual Studio 2013☆112Updated 9 years ago
- scan for NTLM directories☆345Updated 2 months ago
- ☆134Updated 7 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆197Updated last year
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆488Updated 2 years ago
- MS17-010☆267Updated 2 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆221Updated 4 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆732Updated last year
- Kerberoast attack -pure python-☆415Updated 9 months ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆213Updated 3 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆176Updated last year
- ☆161Updated 4 years ago
- ☆121Updated this week
- Windows Kernel Exploits☆65Updated 7 years ago