☆37Feb 12, 2018Updated 8 years ago
Alternatives and similar repositories for BadBackupOperator
Users that are interested in BadBackupOperator are comparing it to the libraries listed below
Sorting:
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆62Apr 18, 2019Updated 6 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Nov 20, 2019Updated 6 years ago
- apache solr 5.x - 8.2.0 rce (with config api)☆11Oct 31, 2019Updated 6 years ago
- Kerberos TGS_REP cracker written in Golang☆57Nov 18, 2015Updated 10 years ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆242May 5, 2023Updated 2 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- ☆37Jan 7, 2025Updated last year
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Dec 29, 2017Updated 8 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Feb 23, 2021Updated 5 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆55Apr 18, 2019Updated 6 years ago
- PowerShell based Microsoft DNS management tool set☆19May 26, 2016Updated 9 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- An Insider Threat Toolkit☆155Dec 17, 2018Updated 7 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆169Jun 16, 2022Updated 3 years ago
- Set Up WebDAV Server for Remote File Sharing and more☆35Aug 22, 2019Updated 6 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- ☆115Aug 9, 2020Updated 5 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- Create a minidump of the LSASS process from memory☆261Nov 2, 2022Updated 3 years ago
- AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.☆67Jun 14, 2020Updated 5 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- ☆38Sep 14, 2020Updated 5 years ago