jellever / CyberArkToolsLinks
Some Python tooling to for example try to decrypt CyberArk .cred credential files
☆56Updated 2 years ago
Alternatives and similar repositories for CyberArkTools
Users that are interested in CyberArkTools are comparing it to the libraries listed below
Sorting:
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆30Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- ☆18Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- .NET wrapper around LogonUserA to test creds☆12Updated 3 years ago
- WMI SA stuffs☆30Updated 3 years ago
- ☆32Updated 5 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- ☆16Updated 3 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Updated 2 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- ☆53Updated 4 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- ☆38Updated last year
- miscellaneous sploit scripts/hacks☆16Updated 4 months ago
- ☆3Updated 5 months ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago