nathunandwani / ctp-osceLinks
Tools that I've created/used during CTP-OSCE
☆10Updated 6 years ago
Alternatives and similar repositories for ctp-osce
Users that are interested in ctp-osce are comparing it to the libraries listed below
Sorting:
- Alphanumeric Encoder☆25Updated 7 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- ☆36Updated 7 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 6 years ago
- Methods of C2☆21Updated 10 years ago
- ☆22Updated 8 years ago
- miscellaneous stuff☆21Updated 10 years ago
- Scripts for OSCE☆18Updated 6 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆55Updated 6 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 6 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- ☆25Updated 5 years ago
- ☆18Updated 6 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- ☆42Updated 7 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- AWS S3 Bucket/Object Finder☆25Updated 8 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆37Updated 9 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆32Updated 4 years ago
- ☆110Updated 7 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- Different code-injections techniques under a common tool☆30Updated 5 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated last year
- F# Implementation to spawn shellcode☆47Updated 7 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- ☆21Updated 6 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆52Updated 5 years ago