ly4k / Pachine
Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)
☆275Updated 3 years ago
Alternatives and similar repositories for Pachine:
Users that are interested in Pachine are comparing it to the libraries listed below
- ☆520Updated 3 years ago
- ☆452Updated 2 years ago
- ☆407Updated 2 years ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆319Updated 2 years ago
- ☆293Updated 10 months ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆421Updated 4 months ago
- Python implementation for PetitPotam☆199Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆288Updated 3 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆185Updated 3 years ago
- ☆344Updated 2 years ago
- Collection of remote authentication triggers in C#☆484Updated 11 months ago
- Persistence by writing/reading shellcode from Event Log☆371Updated 2 years ago
- Amplify network visibility from multiple POV of other hosts☆302Updated last year
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆326Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆302Updated last year
- Check for LDAP protections regarding the relay of NTLM authentication☆493Updated 5 months ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆457Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆366Updated 3 years ago
- Proof-of-concept tools for my AD Forest trust research☆208Updated 10 months ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆232Updated 2 years ago
- Dumping LAPS from Python☆267Updated 2 years ago
- ☆772Updated 2 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆532Updated 2 years ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆273Updated 3 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆451Updated last year
- C# Lsass parser☆291Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆388Updated last year
- ☆383Updated 4 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆415Updated 2 years ago