nettitude / TokenCertLinks
TokenCert
☆102Updated last year
Alternatives and similar repositories for TokenCert
Users that are interested in TokenCert are comparing it to the libraries listed below
Sorting:
- ☆57Updated 10 months ago
- adws enumeration bof☆160Updated 2 months ago
- ☆99Updated last year
- ☆109Updated 10 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- ☆49Updated 6 months ago
- Local SYSTEM auth trigger for relaying - X☆154Updated 5 months ago
- ☆50Updated 5 months ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆167Updated 3 months ago
- Lateral Movement via the .NET Profiler☆84Updated last year
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Updated 2 months ago
- Lateral Movement Bof with MSI ODBC Driver Install☆141Updated 2 months ago
- A simple tool to identify WDS servers in Active Directory☆32Updated 4 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆88Updated 9 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆76Updated last week
- Modified versions of the Cobalt Strike Process Injection Kit☆103Updated last year
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆105Updated 7 months ago
- Click Once + App Domain☆64Updated 2 years ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆51Updated 5 months ago
- RPC to WebClient startup☆53Updated 4 months ago
- A C# utility for interacting with SCOM☆84Updated 3 weeks ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Updated 10 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 7 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆63Updated 11 months ago
- a BOF implementation of various registry persistence methods☆92Updated last month
- Lateral movement with DCOM DLL hijacking☆174Updated 5 months ago
- Impersonate Tokens using only NTAPI functions☆83Updated 8 months ago
- ☆89Updated 2 weeks ago
- ☆136Updated last month
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated 2 years ago