jborean93 / LocalKdcLinks
Info on how to use Kerberos KDC on a non-domain joined host
☆50Updated last year
Alternatives and similar repositories for LocalKdc
Users that are interested in LocalKdc are comparing it to the libraries listed below
Sorting:
- Test AMSI Provider implementation in C#☆42Updated last year
- A C# implementation of dumping credentials from Windows Credential Manager☆61Updated 2 years ago
- Parse SDDL strings☆37Updated last year
- ACL Viewer for Windows☆132Updated 8 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆94Updated 6 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 11 months ago
- ☆27Updated 2 years ago
- Just another ntdll unhooking using Parun's Fart technique☆76Updated 2 years ago
- ☆46Updated 2 years ago
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆113Updated last year
- Simple C# Redirector☆93Updated 5 months ago
- ☆137Updated 11 months ago
- DirSync is a simple proof of concept PowerShell module to demonstrate the impact of delegating DS-Replication-Get-Changes and DS-Replicat…☆29Updated 2 years ago
- AADInternals-Endpoints PowerShell module☆32Updated 6 months ago
- ☆51Updated 7 months ago
- Impersonate Tokens using only NTAPI functions☆83Updated 9 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Updated last year
- Self Delete DLL☆23Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 8 months ago
- ☆40Updated last year
- Tool for playing with Windows Access Token manipulation.☆83Updated 3 years ago
- ☆39Updated 3 years ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Updated 6 months ago
- ☆43Updated last year
- A Patchless AMSI Bypass Technique using VEH²☆30Updated 7 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- a BOF implementation of various registry persistence methods☆94Updated 2 months ago