jeanlucdupont / EXEfromCERLinks
PoC that downloads an executable from a public SSL certificate
☆136Updated 6 months ago
Alternatives and similar repositories for EXEfromCER
Users that are interested in EXEfromCER are comparing it to the libraries listed below
Sorting:
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 10 months ago
- Permanently disable EDRs as local admin☆125Updated last month
- Tool to extract username and password of current user from PanGPA in plaintext☆89Updated last year
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆147Updated last month
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆131Updated 5 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆157Updated 7 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 8 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 10 months ago
- ☆158Updated 8 months ago
- Convert your shellcode into an ASCII string☆125Updated 7 months ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆149Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆57Updated last year
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆68Updated last week
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆163Updated 3 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆97Updated 10 months ago
- Inject RDPThief into memory with PowerShell.☆65Updated last year
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆95Updated last month
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆78Updated last month
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 10 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Updated 3 weeks ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆200Updated 3 weeks ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆77Updated last year
- Remote DLL Injection with Timer-based Shellcode Execution☆152Updated 6 months ago
- Enumerate active EDR's on the system☆150Updated 4 months ago
- ☆59Updated last year
- Our Tips&Tricks☆128Updated 11 months ago
- Microsoft Network Service Fingerprinting Tool☆65Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆162Updated 3 months ago