hackinaggie / OSEP-Tools-v2Links
A marriage between Octoberfest7/OSEP-Tools and chvancooten/OSEP-Code-Snippets with some improvements/additions
☆66Updated 5 months ago
Alternatives and similar repositories for OSEP-Tools-v2
Users that are interested in OSEP-Tools-v2 are comparing it to the libraries listed below
Sorting:
- Precompiled executable☆59Updated 4 months ago
- ☆34Updated 3 years ago
- A cheatsheet for NetExec☆130Updated 2 weeks ago
- A collection of code snippets built to assist with breaking chains.☆117Updated last year
- Sliver CheatSheet for OSEP☆86Updated 2 weeks ago
- 🍊 Orange Tsai EventViewer RCE☆186Updated 3 years ago
- Payload Generation Framework☆91Updated last year
- generate payloads that force authentication against an attacker machine☆107Updated 2 years ago
- Make everyone in your VLAN ASRep roastable☆198Updated 4 months ago
- Attempt at Obfuscated version of SharpCollection☆216Updated last month
- ☆141Updated 2 years ago
- Interract with Microsoft SQL Server (MS SQL | MSSQL) servers and their linked instances in restricted environments, without the need for …☆35Updated last month
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆231Updated 4 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆163Updated 2 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆157Updated 5 months ago
- Custom Queries - Brought Up to BH4.1 syntax☆256Updated 2 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆257Updated 2 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆316Updated last month
- ☆259Updated 3 years ago
- ☆85Updated 5 years ago
- psexecsvc - a python implementation of PSExec's native service implementation☆202Updated 4 months ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆137Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆229Updated 2 months ago
- Timeroasting scripts by Tom Tervoort☆290Updated last year
- ☆219Updated 8 months ago
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆62Updated last year
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆58Updated 2 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆130Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆310Updated 7 months ago
- ☆58Updated 3 weeks ago