decoder-it / whoami-priv-Hackinparis2019View external linksLinks
Slides from my talk in "Hackinparis" 2019 edition
☆91Jun 22, 2019Updated 6 years ago
Alternatives and similar repositories for whoami-priv-Hackinparis2019
Users that are interested in whoami-priv-Hackinparis2019 are comparing it to the libraries listed below
Sorting:
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 6 years ago
- Python api for usage with cobalt strike's External C2 specification☆63Nov 6, 2018Updated 7 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Constrained Language Mode + AMSI bypass all in one☆158Jul 29, 2019Updated 6 years ago
- ☆30Apr 24, 2019Updated 6 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Apr 18, 2019Updated 6 years ago
- ☆230May 10, 2018Updated 7 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆77Jul 3, 2018Updated 7 years ago
- Notes as I learn basic AWS penetration testing☆67May 28, 2019Updated 6 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Feb 11, 2025Updated last year
- Windows RID Hijacking persistence technique☆178Nov 20, 2024Updated last year
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- Find vulnerabilities in AD Group Policy☆641Mar 25, 2022Updated 3 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the a…☆123Jul 7, 2023Updated 2 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- UAC Bypass with mmc via alpc☆158Apr 5, 2019Updated 6 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 5 years ago
- My python3 implementation of a Forward Shell☆36Jan 25, 2019Updated 7 years ago
- Abusing Exchange via EWS☆152Sep 14, 2020Updated 5 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65May 24, 2019Updated 6 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- named pipe server with impersonation☆60May 11, 2019Updated 6 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Nov 2, 2019Updated 6 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Oct 28, 2019Updated 6 years ago