p0dalirius / MSRPRN-CoerceLinks
A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).
☆27Updated 7 months ago
Alternatives and similar repositories for MSRPRN-Coerce
Users that are interested in MSRPRN-Coerce are comparing it to the libraries listed below
Sorting:
- ☆91Updated 8 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆144Updated 6 months ago
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆64Updated 2 weeks ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆40Updated 10 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 8 months ago
- CLI tool to interact with the BloodHound CE API☆54Updated last week
- ☆70Updated 8 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆53Updated last week
- ☆52Updated 3 years ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆111Updated 3 years ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆112Updated 2 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆137Updated 2 months ago
- A python wrapper to run a command on against all users/computers/DCs of a Windows Domain☆28Updated 3 years ago
- ☆147Updated 5 months ago
- Impacket pre-compiled binaries☆17Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆118Updated 2 weeks ago
- ☆97Updated 7 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆31Updated this week
- ☆119Updated 6 months ago
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆21Updated 11 months ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Updated 3 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- ☆71Updated 6 months ago
- Impacket is a collection of Python classes for working with network protocols.☆18Updated 4 months ago
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆31Updated 3 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Updated last year
- ☆18Updated 9 months ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆26Updated 2 years ago
- ☆73Updated 3 months ago
- A Python native library containing necessary classes, functions and structures to interact with Windows Active Directory.☆65Updated 7 months ago