mubix / IOXIDResolver
IOXIDResolver.py from AirBus Security
☆220Updated last year
Related projects ⓘ
Alternatives and complementary repositories for IOXIDResolver
- Extracts Key Values from .keytab files☆215Updated 4 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆728Updated 11 months ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆804Updated last year
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆399Updated 2 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆270Updated 2 years ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆304Updated 2 years ago
- Kerberoast with ACL abuse capabilities☆354Updated 3 weeks ago
- Tools for Kerberos PKINIT and relaying to AD CS☆639Updated 7 months ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆573Updated 4 months ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆171Updated 3 weeks ago
- Dumping LAPS from Python☆255Updated last year
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆496Updated 2 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆245Updated 9 months ago
- ☆402Updated 2 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆178Updated 2 years ago
- ☆499Updated 3 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆194Updated last week
- AD ACL abuse☆261Updated 4 months ago
- Ad hoc collection of Red Teaming & Active Directory tooling.☆171Updated last year
- ☆442Updated 2 years ago
- ☆290Updated 4 months ago
- ☆735Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆403Updated 2 years ago
- Retrieve LAPS password from LDAP☆385Updated 3 years ago
- ☆378Updated 3 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆291Updated 11 years ago
- Collection of username lists for enumerating kerberos domain users☆81Updated 6 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆704Updated 11 months ago
- Python version of the C# tool for "Shadow Credentials" attacks☆611Updated this week
- project-blacklist3r☆499Updated 2 years ago