p0dalirius / pyDescribeNTSecurityDescriptorLinks
A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.
☆23Updated last month
Alternatives and similar repositories for pyDescribeNTSecurityDescriptor
Users that are interested in pyDescribeNTSecurityDescriptor are comparing it to the libraries listed below
Sorting:
- Impacket pre-compiled binaries☆17Updated 2 years ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆135Updated 2 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆142Updated 5 months ago
- ☆29Updated last year
- SCEP request tool for AD CS and Intune☆69Updated last month
- ☆146Updated 4 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆40Updated 9 months ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Updated 3 years ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆126Updated last month
- Dump Kerberos tickets☆40Updated last month
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆129Updated 2 months ago
- Lateral movement with DCOM DLL hijacking☆140Updated 2 months ago
- Local SYSTEM auth trigger for relaying☆158Updated 2 months ago
- AzureAD beacon object files☆126Updated 9 months ago
- OAuth Device Code Phishing Toolkit☆87Updated 2 weeks ago
- CLI tool to interact with the BloodHound CE API☆53Updated last week
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆23Updated this week
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆26Updated 7 months ago
- ForsHops☆149Updated 5 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆166Updated 9 months ago
- A python script that automates a C2 Profile build☆47Updated 2 weeks ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- A hoontr must hoont☆94Updated last month
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆31Updated 8 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 4 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated 2 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆149Updated 7 months ago
- ☆49Updated 5 months ago
- ☆135Updated 7 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆41Updated 3 months ago