This Repository contains the stuff related to windows Active directory environment exploitation
☆153Jul 31, 2023Updated 2 years ago
Alternatives and similar repositories for Windows-AD-environment-related
Users that are interested in Windows-AD-environment-related are comparing it to the libraries listed below
Sorting:
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆223Dec 5, 2020Updated 5 years ago
- Run Rubeus via Rundll32☆207Apr 25, 2020Updated 5 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- WINDOWS TELEMETRY权限维持☆258Jul 2, 2020Updated 5 years ago
- 利用NTLM Hash读取Exchange邮件☆441Jan 7, 2025Updated last year
- PoC for UUID shellcode execution using DInvoke☆155Mar 8, 2021Updated 5 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆250Mar 31, 2021Updated 4 years ago
- proxyshell payload generate☆75Aug 14, 2021Updated 4 years ago
- ☆85Dec 6, 2019Updated 6 years ago
- 创建服 务持久化☆108Apr 26, 2021Updated 4 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- CommonsBeanutils1,CommonsCollectionsK1☆58Nov 16, 2020Updated 5 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆479May 24, 2022Updated 3 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- ☆159Aug 4, 2020Updated 5 years ago
- Proof-of-concept tools for my AD Forest trust research☆236Jun 10, 2024Updated last year
- redteam Build platform☆19Nov 13, 2023Updated 2 years ago
- ☆667Nov 17, 2021Updated 4 years ago
- reGeorg的特殊版本,适用于老版本weblogic。☆151Apr 30, 2020Updated 5 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆769Feb 16, 2021Updated 5 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 7 years ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- A fake JDBC driver that allows OS command execution.☆125Oct 2, 2022Updated 3 years ago
- Use to build an anonymous SMB file server.☆232Aug 20, 2021Updated 4 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆204Nov 8, 2020Updated 5 years ago
- CVE-2021-1675 (PrintNightmare)☆77Jul 5, 2021Updated 4 years ago
- ☆11Jan 29, 2021Updated 5 years ago
- 用WebShell攻击PHP-FPM Attacking PHP-FPM with WebShell☆41May 6, 2021Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆41Aug 6, 2021Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆719Aug 17, 2021Updated 4 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆115Jun 7, 2021Updated 4 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆840Dec 2, 2023Updated 2 years ago
- ☆361Apr 24, 2021Updated 4 years ago
- Kerberos manipulation library in pure Python☆305Oct 29, 2025Updated 4 months ago