p0dalirius / MSRPRN-CoerceLinks
A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).
☆29Updated 11 months ago
Alternatives and similar repositories for MSRPRN-Coerce
Users that are interested in MSRPRN-Coerce are comparing it to the libraries listed below
Sorting:
- ☆94Updated 11 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated 2 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆134Updated 11 months ago
- CLI tool to interact with the BloodHound CE API☆64Updated 3 weeks ago
- Impacket pre-compiled binaries☆18Updated 2 years ago
- ☆79Updated 11 months ago
- ☆155Updated 8 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆116Updated 5 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆146Updated 5 months ago
- The DCERPC only printerbug.py version☆186Updated 2 months ago
- ☆101Updated 11 months ago
- ☆120Updated 9 months ago
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆30Updated 3 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated last year
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆162Updated 2 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Updated 3 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆34Updated 3 months ago
- ☆233Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆45Updated last year
- A Python POC for CRED1 over SOCKS5☆162Updated last year
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆64Updated 3 months ago
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆26Updated 4 months ago
- pysnaffler☆109Updated this week
- Automated exploitation of MSSQL servers at scale☆128Updated last month
- a port of privkit bof for havoc☆24Updated 2 years ago
- ☆29Updated last year
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆25Updated 8 months ago
- ☆198Updated 9 months ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Updated 3 years ago
- Local SYSTEM auth trigger for relaying☆168Updated 5 months ago