The DCERPC only printerbug.py version
☆210Oct 30, 2025Updated 4 months ago
Alternatives and similar repositories for printerbugnew
Users that are interested in printerbugnew are comparing it to the libraries listed below
Sorting:
- Generate and Manage KeyCredentialLinks☆250Mar 9, 2026Updated last week
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆147Jul 17, 2025Updated 8 months ago
- adws enumeration bof☆169Feb 16, 2026Updated last month
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆48Oct 4, 2025Updated 5 months ago
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆209Jan 6, 2026Updated 2 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 4 months ago
- Local SYSTEM auth trigger for relaying☆170Jul 22, 2025Updated 7 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆78Oct 27, 2025Updated 4 months ago
- Lateral Movement Bof with MSI ODBC Driver Install☆147Sep 30, 2025Updated 5 months ago
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆657Jan 16, 2026Updated 2 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆234Feb 12, 2025Updated last year
- ☆94Dec 9, 2025Updated 3 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- Hybrid AD utilities for ROADtools☆108May 25, 2025Updated 9 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- Python tool to automatically perform SPN-less RBCD attacks.☆124Jan 7, 2026Updated 2 months ago
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads☆241Oct 30, 2025Updated 4 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 6 months ago
- ☆18Feb 29, 2024Updated 2 years ago
- ☆234Oct 8, 2024Updated last year
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆124Jan 17, 2026Updated 2 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆93Jan 8, 2025Updated last year
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆898Mar 11, 2026Updated last week
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆31Sep 17, 2025Updated 6 months ago
- Windows remote execution multitool☆785Mar 10, 2026Updated last week
- ☆102Feb 24, 2026Updated 3 weeks ago
- A community-driven collection of BloodHound queries