ka7ana / CVE-2023-23397
Simple PoC in PowerShell for CVE-2023-23397
☆41Updated last year
Related projects: ⓘ
- ☆110Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆164Updated last year
- ☆95Updated 2 years ago
- Cortex XDR Config Extractor☆119Updated last year
- Some scripts to support with importing large datasets into BloodHound☆75Updated 9 months ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆148Updated last year
- Just some random Red Team Scripts that can be useful☆131Updated 2 months ago
- PowerShell Reverse Shell☆60Updated last year
- Azure AD cheatsheet for the CARTP course☆94Updated 2 years ago
- Modular Enumeration and Password Spraying Framework☆104Updated 5 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆66Updated last year
- ☆114Updated 2 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆129Updated 10 months ago
- A Python based ingestor for BloodHound☆81Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆31Updated 6 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆89Updated 3 months ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆102Updated 4 years ago
- ☆117Updated last year
- linikatz is a tool to attack AD on UNIX☆134Updated 11 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆131Updated last month
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- ☆46Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆39Updated 3 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆28Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆75Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆116Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆80Updated 2 years ago
- AV EVASION TECHNIQUES☆68Updated 2 years ago
- Make everyone in your VLAN ASRep roastable☆114Updated 3 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆87Updated last year