e1abrador / Crackmapexec-custom-modules
Crackmapexec custom scripts used in my internal pentests.
☆25Updated last year
Alternatives and similar repositories for Crackmapexec-custom-modules:
Users that are interested in Crackmapexec-custom-modules are comparing it to the libraries listed below
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆78Updated last year
- ☆14Updated last year
- ☆74Updated 2 weeks ago
- Phishing Framework for OTP codes☆18Updated 3 weeks ago
- ☆47Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆43Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated 2 years ago
- ☆51Updated 11 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆93Updated 3 months ago
- List of some AD tools I frequently use☆44Updated 4 months ago
- ☆93Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Automated exploitation of MSSQL servers at scale☆104Updated this week
- PowerShell Reverse Shell☆61Updated last year
- Azure Service Subdomain Enumeration☆47Updated 4 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆42Updated 3 months ago
- ☆145Updated 11 months ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆15Updated 10 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆101Updated last week
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated 2 months ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- ☆15Updated 2 years ago
- CVE-2023-20198 Exploit PoC☆41Updated last year
- ☆28Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 2 years ago
- Inject RDPThief into memory with PowerShell.☆58Updated last week
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆52Updated last month