dreamkinn / CompileCSDockerLinks
Compile SharpHound and others on Linux
☆24Updated 11 months ago
Alternatives and similar repositories for CompileCSDocker
Users that are interested in CompileCSDocker are comparing it to the libraries listed below
Sorting:
- Python utility that generates "imageless" QR codes in various formats☆125Updated last year
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆91Updated last week
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆168Updated 3 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆89Updated 11 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆157Updated last year
- Dump Kerberos tickets☆18Updated last week
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- C++ Reflective Assembly Loader☆27Updated 5 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆262Updated last month
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆241Updated 3 weeks ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆157Updated 7 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆159Updated last month
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆190Updated 10 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆135Updated 4 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆164Updated 3 months ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆165Updated 3 months ago
- ☆220Updated 10 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆195Updated this week
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆201Updated last month
- ☆157Updated 6 months ago
- ☆66Updated last week
- ☆208Updated last year
- ☆144Updated 3 months ago
- A Python POC for CRED1 over SOCKS5☆153Updated 10 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆210Updated 6 months ago
- ☆29Updated 11 months ago
- Enumerate Domain Users Without Authentication☆257Updated 3 months ago
- Parses Snaffler output file and generate beautified outputs.☆106Updated 6 months ago
- pysnaffler☆100Updated 3 weeks ago
- Tiny and fast port scanner (Sliver edition)☆24Updated 5 months ago