nccgroup / Change-Lockscreen
Offensive tool to trigger network authentications as SYSTEM
☆137Updated 2 years ago
Related projects: ⓘ
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆75Updated 4 months ago
- ☆133Updated 10 months ago
- ☆141Updated 11 months ago
- Find .net assemblies locally☆85Updated last year
- ☆117Updated last year
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆180Updated 3 years ago
- ☆144Updated 7 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆66Updated last year
- Some scripts to support with importing large datasets into BloodHound☆75Updated 9 months ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆116Updated 2 years ago
- Remotely enables Restricted Admin Mode☆202Updated 3 years ago
- Koppeling x Metatwin x LazySign☆200Updated 3 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆60Updated 11 months ago
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆153Updated 2 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆117Updated 6 months ago
- python spraying tools based on impacket lib☆42Updated 2 years ago
- GolenGMSA tool for working with GMSA passwords☆133Updated 5 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆250Updated last year
- C# version of Powermad☆152Updated 9 months ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆182Updated 3 years ago
- Hookers are cooler than patches.☆167Updated 2 years ago
- Simple rapper for Mimikatz, bypass Defender☆139Updated 2 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆118Updated 2 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆95Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆164Updated last year
- Tool for interacting with outlook interop during red team engagements☆143Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆148Updated last year
- ☆102Updated last month
- Bypassing AppLocker with C#☆136Updated 3 years ago