nettitude / raccoonLinks
☆53Updated 11 months ago
Alternatives and similar repositories for raccoon
Users that are interested in raccoon are comparing it to the libraries listed below
Sorting:
- ☆83Updated last year
- SAM Dumping in C#☆54Updated last month
- Dump processes over WMI with MSFT_MTProcess☆81Updated 3 months ago
- TokenCert☆102Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated 2 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆77Updated 2 years ago
- ☆57Updated 10 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Updated 3 months ago
- Secretsdump C# version only supporting local (live) operation☆54Updated 8 months ago
- ☆38Updated 10 months ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆51Updated 5 months ago
- ☆108Updated 10 months ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- A C# port from Invoke-GhostTask☆119Updated 2 years ago
- Sniffing files generator☆59Updated 10 months ago
- Python tool to interact with WMI StdRegProv☆60Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- ☆92Updated last year
- Click Once + App Domain☆64Updated 2 years ago
- ☆64Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Updated 11 months ago
- Lateral Movement via the .NET Profiler☆84Updated last year
- ☆51Updated 6 months ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆69Updated 2 months ago
- To audit the security of read-only domain controllers☆118Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆105Updated last year
- Validates priv escalation of AD trusts☆48Updated 9 months ago
- Microsoft Graph API post-exploitation toolkit☆95Updated last year
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Updated last year