ibaiC / BadSuccessorLinks
A PoC for the dMSA Active Directory Domain Takeover deemed BadSuccessor
☆47Updated 6 months ago
Alternatives and similar repositories for BadSuccessor
Users that are interested in BadSuccessor are comparing it to the libraries listed below
Sorting:
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆155Updated 3 months ago
- ☆94Updated last year
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆146Updated 6 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆164Updated 9 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆291Updated this week
- ☆120Updated 8 months ago
- The DCERPC only printerbug.py version☆201Updated 3 months ago
- ☆99Updated 2 months ago
- ☆159Updated 9 months ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆230Updated last year
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆151Updated last month
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆119Updated 6 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆260Updated 11 months ago
- Continuous password spraying tool☆200Updated 2 months ago
- Generate and Manage KeyCredentialLinks☆241Updated last week
- ☆235Updated 8 months ago
- Python tool to automatically perform SPN-less RBCD attacks.☆114Updated last month
- ☆235Updated last year
- ☆29Updated last year
- ☆75Updated 10 months ago
- Advanced In-Memory PowerShell Process Injection Framework☆72Updated 6 months ago
- A Python POC for CRED1 over SOCKS5☆164Updated last year
- OAuth Device Code Phishing Toolkit☆109Updated last week
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆213Updated 3 weeks ago
- ☆216Updated last year
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆207Updated 2 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆235Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆212Updated last year
- A community-driven collection of BloodHound queries☆160Updated last week
- A fast TCP/UDP tunnel over HTTP☆23Updated last year