SCEP request tool for AD CS and Intune
☆73Oct 24, 2025Updated 4 months ago
Alternatives and similar repositories for scepreq
Users that are interested in scepreq are comparing it to the libraries listed below
Sorting:
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- RPC to WebClient startup☆55Aug 19, 2025Updated 6 months ago
- ☆12May 21, 2025Updated 9 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆144Feb 16, 2026Updated 2 weeks ago
- Group Policy Objects manipulation and exploitation framework☆292Dec 7, 2025Updated 2 months ago
- Python script to leverage MSFT_MTProcess WMI class☆39Sep 17, 2025Updated 5 months ago
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆47Oct 4, 2025Updated 5 months ago
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 6 months ago
- ☆38Mar 28, 2025Updated 11 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- A simple C++ Windows tool to get information about processes exposing named pipes.☆40Mar 6, 2025Updated 11 months ago
- Lateral movement with DCOM DLL hijacking☆177Jul 4, 2025Updated 8 months ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆107Sep 4, 2025Updated 6 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Python tool to automatically perform SPN-less RBCD attacks.☆123Jan 7, 2026Updated last month
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆158Jun 24, 2025Updated 8 months ago
- ☆160May 5, 2025Updated 10 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆332Jan 24, 2026Updated last month
- ☆285Aug 14, 2025Updated 6 months ago
- ☆52Jul 8, 2025Updated 7 months ago
- ☆18Feb 29, 2024Updated 2 years ago
- A BOF to enumerate system process, their protection levels, and more.☆125Nov 27, 2024Updated last year
- This code silently installs Chrome extensions on Mac, Windows, and Linux☆129Jul 22, 2025Updated 7 months ago
- Evasive Payload Delivery Server & C2 Redirector☆112Nov 3, 2025Updated 4 months ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆275Dec 27, 2024Updated last year
- Local SYSTEM auth trigger for relaying☆169Jul 22, 2025Updated 7 months ago
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated last month
- MS17-010 Exploits With Original NSA Tool(only for windows)☆31Jul 30, 2024Updated last year
- Abuse Azure API permissions for red teaming☆71Jan 24, 2023Updated 3 years ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 6 months ago
- Brute Ratel External C2 (Microsoft Teams)☆38Dec 11, 2024Updated last year
- ☆146Nov 6, 2025Updated 3 months ago
- An App Domain Manager Injection DLL PoC on steroids☆212Dec 14, 2023Updated 2 years ago
- ☆33Mar 19, 2025Updated 11 months ago