jeanlucdupont / EXEfromCERLinks
PoC that downloads an executable from a public SSL certificate
☆136Updated 4 months ago
Alternatives and similar repositories for EXEfromCER
Users that are interested in EXEfromCER are comparing it to the libraries listed below
Sorting:
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 9 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆162Updated last month
- Convert your shellcode into an ASCII string☆125Updated 5 months ago
- ☆62Updated last week
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 6 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated last year
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- Permanently disable EDRs as local admin☆122Updated this week
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 7 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆88Updated last month
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆118Updated last month
- ☆85Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- ☆151Updated 7 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆151Updated 2 months ago
- Adversary Emulation Framework☆128Updated 5 months ago
- Our Tips&Tricks☆128Updated 10 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆99Updated 7 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆76Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 8 months ago
- ☆59Updated last year
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆61Updated this week
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆129Updated 3 months ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆83Updated last week
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆49Updated 2 weeks ago
- Enumerate active EDR's on the system☆148Updated 3 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 11 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆95Updated 8 months ago