morRubin / PrtToCertLinks
☆28Updated 5 years ago
Alternatives and similar repositories for PrtToCert
Users that are interested in PrtToCert are comparing it to the libraries listed below
Sorting:
- Tool to perform lateral movement between AAD joined devices☆66Updated 3 years ago
- ☆23Updated 4 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 3 years ago
- blame Huy☆42Updated 5 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Updated 2 years ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆20Updated last year
- ☆27Updated 4 years ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Updated 5 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- ☆14Updated 2 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Updated 2 years ago
- terraform deployment for red team☆26Updated 3 years ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆48Updated 11 months ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Updated 2 weeks ago
- Change up a binary's embedded resources with this little creature.☆36Updated 5 years ago
- POC tool to abuse windows server failover clusters☆53Updated 5 months ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50Updated 3 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53Updated 5 years ago
- ☆21Updated 3 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Updated 9 months ago
- ☆59Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Updated 4 years ago
- ☆62Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- Ansible role that Installs Mythic☆18Updated last year
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆21Updated 5 months ago