mikkolehtisalo / gssapi-proxyLinks
GSSAPI/Kerberos proxy
☆31Updated 11 years ago
Alternatives and similar repositories for gssapi-proxy
Users that are interested in gssapi-proxy are comparing it to the libraries listed below
Sorting:
- ☆52Updated 6 years ago
- ☆80Updated 9 years ago
- ☆97Updated 9 years ago
- Memory Backed Powershell WebDav Server☆138Updated 4 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Updated 9 years ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆38Updated 7 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65Updated 6 years ago
- Offensive Data Storage☆60Updated 8 years ago
- A sample bot for Cobalt Strike 3☆22Updated 9 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Updated 8 years ago
- ☆113Updated 8 years ago
- Run commands over RDP on massive number of hosts☆11Updated 6 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 8 years ago
- Windows DPAPI laboratory☆93Updated 7 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- Certificate Export Utility☆26Updated 5 years ago
- Binary resource copier☆98Updated 4 months ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆104Updated 8 years ago
- ☆50Updated 7 years ago
- gpocheck☆30Updated last year
- A ton of helpful tools☆39Updated 3 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 9 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆87Updated 7 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Updated 5 years ago
- Decrypt NTDS hashes☆23Updated 11 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- PowerShell to Slack C2☆109Updated 7 years ago
- ☆33Updated 3 years ago
- Breaking the security of Microsoft's RMS☆55Updated 6 years ago
- In motherland, target network calls you!☆60Updated 6 years ago