netwrix / server-untrust-account
A technique for Active Directory domain persistence
☆39Updated last year
Alternatives and similar repositories for server-untrust-account:
Users that are interested in server-untrust-account are comparing it to the libraries listed below
- WhoAmI by asking the LDAP service on a domain controller.☆62Updated 3 years ago
- ☆38Updated 2 years ago
- A little scanner to check the LDAP Signing state☆46Updated 3 years ago
- ☆36Updated 11 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Updated 3 years ago
- ☆25Updated 3 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- Grab unsaved Notepad contents with a Beacon Object File☆51Updated 2 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Updated last year
- A BOF port of the research of @thefLinkk and @codewhitesec☆96Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- C# port of LogServiceCrash☆46Updated 4 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆85Updated 2 years ago
- aggressor and pycobalt scripts.☆18Updated 4 years ago
- Some of my custom "tools".☆23Updated 3 years ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆26Updated 9 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 2 months ago
- I have created a small C# project that requests a Ticket Granting Service (TGS) ticket using KerberosSecurityTokenProvider to use for Ker…☆5Updated 11 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- IOXIDResolver from AirBus Security/PingCastle☆50Updated 4 years ago
- ☆58Updated 3 years ago
- ☆53Updated 4 years ago
- C# Data Collector for the BloodHound Project, Version 3☆36Updated 3 years ago
- Beacon Object Files (not Buffer Overflows)☆54Updated 2 years ago
- C# loader that copies a chunk at the time of the shellcode in memory, rather that all at once☆23Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆40Updated last month
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆27Updated 4 years ago