leechristensen / tgscrackView external linksLinks
Kerberos TGS_REP cracker written in Golang
☆57Nov 18, 2015Updated 10 years ago
Alternatives and similar repositories for tgscrack
Users that are interested in tgscrack are comparing it to the libraries listed below
Sorting:
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆196Jun 30, 2019Updated 6 years ago
- ☆37Feb 12, 2018Updated 8 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- c# implementation of Active Directory Integrated DNS dumping (authenticated user)☆205May 25, 2021Updated 4 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- ☆82Feb 12, 2022Updated 4 years ago
- ☆182Feb 21, 2022Updated 3 years ago
- ☆1,488Dec 31, 2022Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆313Nov 29, 2023Updated 2 years ago
- C# PoC implementation for bypassing AMSI via in memory patching☆66Jul 20, 2020Updated 5 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆525Jan 21, 2022Updated 4 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆169Jun 16, 2022Updated 3 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,086May 29, 2024Updated last year
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Feb 23, 2021Updated 4 years ago
- SharpShell is a proof-of-concept offensive C# scripting engine that utilizes the Rosyln C# compiler to quickly cross-compile .NET Framew…☆128Dec 11, 2018Updated 7 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 2 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/☆159Jul 9, 2020Updated 5 years ago
- Constrained Language Mode + AMSI bypass all in one☆158Jul 29, 2019Updated 6 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆233May 30, 2019Updated 6 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- Exploits, Exploits, Exploits and more Exploits!☆33Nov 7, 2020Updated 5 years ago
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- random powershell goodness☆460Nov 21, 2024Updated last year
- .NET 4.0 WinRM API Command Execution☆166Sep 11, 2020Updated 5 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆148Sep 8, 2022Updated 3 years ago
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆301Mar 4, 2020Updated 5 years ago
- Using "svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc" as trigger☆58Oct 7, 2020Updated 5 years ago