SCEP request tool for AD CS and Intune
☆74Oct 24, 2025Updated 5 months ago
Alternatives and similar repositories for scepreq
Users that are interested in scepreq are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 7 months ago
- RPC to WebClient startup☆57Aug 19, 2025Updated 7 months ago
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 7 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆145Feb 16, 2026Updated last month
- ☆13May 21, 2025Updated 10 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- Group Policy Objects manipulation and exploitation framework☆298Dec 7, 2025Updated 3 months ago
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated last year
- ☆287Aug 14, 2025Updated 7 months ago
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆48Oct 4, 2025Updated 5 months ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆31Jan 22, 2026Updated 2 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆161Jun 24, 2025Updated 9 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- ☆48Dec 5, 2025Updated 3 months ago
- Python tool to automatically perform SPN-less RBCD attacks.☆126Jan 7, 2026Updated 2 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- This code silently installs Chrome extensions on Mac, Windows, and Linux☆131Jul 22, 2025Updated 8 months ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- ☆18Feb 29, 2024Updated 2 years ago
- General Purpose OpSec Server☆112Mar 13, 2026Updated last week
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Lateral movement with DCOM DLL hijacking☆176Jul 4, 2025Updated 8 months ago
- ☆164May 5, 2025Updated 10 months ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- ADCS cert template modification and ACL enumeration☆143Jun 26, 2023Updated 2 years ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆40Mar 6, 2025Updated last year
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Local SYSTEM auth trigger for relaying☆170Jul 22, 2025Updated 8 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- An App Domain Manager Injection DLL PoC on steroids☆212Dec 14, 2023Updated 2 years ago
- A stager and implant that executes remote Web Assembly☆60Feb 4, 2026Updated last month
- ☆38Mar 28, 2025Updated 11 months ago
- Brute Ratel External C2 (Microsoft Teams)☆38Dec 11, 2024Updated last year
- ☆38Jan 7, 2025Updated last year
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 7 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆342Jan 24, 2026Updated 2 months ago
- ☆53Jul 8, 2025Updated 8 months ago