p0dalirius / DomainUsersToXLSX
Extract all users from an Active Directory domain to an Excel worksheet.
☆32Updated 2 months ago
Alternatives and similar repositories for DomainUsersToXLSX:
Users that are interested in DomainUsersToXLSX are comparing it to the libraries listed below
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆108Updated 2 years ago
- ☆51Updated 3 years ago
- ☆83Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆76Updated 2 years ago
- A python wrapper to run a command on against all users/computers/DCs of a Windows Domain☆28Updated 2 years ago
- Winsocket for Cobalt Strike.☆98Updated last year
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆38Updated last year
- C# havoc implant☆100Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures …☆34Updated 9 months ago
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆21Updated last month
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆17Updated 5 months ago
- C# Port of LdapRelayScan☆80Updated 3 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆42Updated 11 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- ☆85Updated last year
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆54Updated 11 months ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆132Updated 3 years ago
- Secretsdump C# version only supporting local (live) operation☆49Updated last year
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- To audit the security of read-only domain controllers☆115Updated last year
- Aggressor script add-in for CobaltStrike to track file uploads☆36Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆118Updated 6 months ago
- ☆96Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆81Updated last year
- DCSync Attack from Outside using Impacket☆112Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆37Updated 2 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆47Updated 2 months ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆83Updated 2 years ago
- ☆88Updated 2 years ago