incredibleindishell / Windows-AD-environment-relatedView external linksLinks
This Repository contains the stuff related to windows Active directory environment exploitation
☆153Jul 31, 2023Updated 2 years ago
Alternatives and similar repositories for Windows-AD-environment-related
Users that are interested in Windows-AD-environment-related are comparing it to the libraries listed below
Sorting:
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆224Dec 5, 2020Updated 5 years ago
- Run Rubeus via Rundll32☆208Apr 25, 2020Updated 5 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- proxyshell payload generate☆75Aug 14, 2021Updated 4 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆479May 24, 2022Updated 3 years ago
- ☆667Nov 17, 2021Updated 4 years ago
- Kerberos manipulation library in pure Python☆305Oct 29, 2025Updated 3 months ago
- Proof-of-concept tools for my AD Forest trust research☆232Jun 10, 2024Updated last year
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- WINDOWS TELEMETRY权限维持☆258Jul 2, 2020Updated 5 years ago
- 利用NTLM Hash读取Exchange邮件☆441Jan 7, 2025Updated last year
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆252Mar 31, 2021Updated 4 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆205Nov 8, 2020Updated 5 years ago
- PoC for UUID shellcode execution using DInvoke☆155Mar 8, 2021Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆768Feb 16, 2021Updated 4 years ago
- CommonsBeanutils1,CommonsCollectionsK1☆58Nov 16, 2020Updated 5 years ago
- A fake JDBC driver that allows OS command execution.☆125Oct 2, 2022Updated 3 years ago
- CVE-2021-1675 (PrintNightmare)☆77Jul 5, 2021Updated 4 years ago
- Use to build an anonymous SMB file server.☆232Aug 20, 2021Updated 4 years ago
- ☆159Aug 4, 2020Updated 5 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆830Dec 2, 2023Updated 2 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- ☆85Dec 6, 2019Updated 6 years ago
- redteam Build platform☆19Nov 13, 2023Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆863Mar 20, 2023Updated 2 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 6 years ago
- ☆362Apr 24, 2021Updated 4 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- 创建服务持久化☆108Apr 26, 2021Updated 4 years ago
- ☆66Aug 25, 2021Updated 4 years ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- C# Script used for Red Team☆724Nov 16, 2021Updated 4 years ago
- CatchMail can be used to find some email addresses!☆73May 22, 2023Updated 2 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆26Updated this week
- Phish password protected Excel-Files☆107Jan 17, 2024Updated 2 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,097Jun 25, 2024Updated last year