Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"
☆22Oct 12, 2025Updated 5 months ago
Alternatives and similar repositories for OverLAPS
Users that are interested in OverLAPS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- ☆12Oct 24, 2022Updated 3 years ago
- Vectored Exception Handling Squared☆31Dec 27, 2025Updated 2 months ago
- Erebus is a payload generator written in Nim.☆17Jun 13, 2023Updated 2 years ago
- Validates priv escalation of AD trusts☆47Apr 1, 2025Updated 11 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated 2 weeks ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆61Jul 10, 2024Updated last year
- Plugin for x64dbg that allows you to select block of data in dump widget easier☆20Jul 20, 2021Updated 4 years ago
- C# .NET Assembly for interacting with File Object DACLs☆45Apr 3, 2020Updated 5 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated 11 months ago
- ☆120May 29, 2025Updated 9 months ago
- Lateral movement with DCOM DLL hijacking☆176Jul 4, 2025Updated 8 months ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- ☆61Oct 24, 2025Updated 4 months ago
- Test AMSI Provider implementation in C#☆43Dec 18, 2024Updated last year
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 11 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 10 months ago
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆55Dec 30, 2025Updated 2 months ago
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆41Jan 23, 2026Updated 2 months ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- IDA plugin to make classes automatically☆20Oct 31, 2024Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆67Mar 6, 2026Updated 2 weeks ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Dec 2, 2024Updated last year
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆121Sep 2, 2025Updated 6 months ago
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- ☆23May 28, 2021Updated 4 years ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- Tool to manage user privileges☆31Sep 4, 2019Updated 6 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆59Jul 23, 2025Updated 8 months ago
- Amplify network visibility from multiple POV of other hosts☆307Apr 12, 2024Updated last year
- Offensive RPC PoC☆89Sep 29, 2021Updated 4 years ago
- Proof of concept for Kerberos Armoring abuse.☆82Dec 12, 2025Updated 3 months ago
- ☆24Sep 26, 2021Updated 4 years ago