ka7ana / CVE-2023-23397
Simple PoC in PowerShell for CVE-2023-23397
☆40Updated last year
Alternatives and similar repositories for CVE-2023-23397:
Users that are interested in CVE-2023-23397 are comparing it to the libraries listed below
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated last year
- ☆113Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆90Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆101Updated last week
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆185Updated last month
- ☆155Updated 2 months ago
- ☆96Updated 2 years ago
- Most Responder's configuration power in your hand.☆42Updated last week
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆37Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆86Updated last year
- A Python POC for CRED1 over SOCKS5☆139Updated 3 months ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆119Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆104Updated this week
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆100Updated 2 years ago
- ☆47Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆83Updated 8 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- Just some random Red Team Scripts that can be useful☆148Updated 7 months ago
- Modular Enumeration and Password Spraying Framework☆114Updated 9 months ago
- ☆144Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆113Updated 4 years ago
- ☆39Updated this week
- Cortex XDR Config Extractor☆131Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆252Updated last year
- Living Off the Foreign Land setup scripts☆64Updated 3 weeks ago
- Parses Snaffler output file and generate beautified outputs.☆66Updated this week
- PowerShell Reverse Shell☆61Updated last year