heartburn-dev / PKI-Escalate
Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Services and Enrollment Services ADCS containers to obtain Enterprise Administrator from Domain Administrator. Works by enabling a user to perform ESC1 (Enrolee supplying the SAN).
☆25Updated last year
Alternatives and similar repositories for PKI-Escalate:
Users that are interested in PKI-Escalate are comparing it to the libraries listed below
- Extract registry and NTDS secrets from local or remote disk images☆34Updated 4 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 7 months ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆17Updated 3 months ago
- ☆46Updated last year
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- ☆43Updated 6 months ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated last year
- ☆25Updated last year
- My BloodHound custom queries☆23Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆70Updated last year
- ☆52Updated last year
- ☆48Updated 2 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated last month
- Situational Awareness script to identify how and where to run implants☆41Updated last month
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆39Updated 3 weeks ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 7 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 4 months ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆31Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 8 months ago
- Scripts to interact with Microsoft Graph APIs☆32Updated 2 months ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Discord C2 Profile for Mythic☆26Updated 9 months ago
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆29Updated 9 months ago
- ☆70Updated last year
- Impacket pre-compiled binaries☆15Updated last year
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆68Updated 8 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 4 months ago
- Mythic C2 wrapper for NimSyscallPacker☆22Updated last month
- A small red team course☆34Updated last year