p0dalirius / pyDescribeNTSecurityDescriptorLinks
A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.
☆22Updated 5 months ago
Alternatives and similar repositories for pyDescribeNTSecurityDescriptor
Users that are interested in pyDescribeNTSecurityDescriptor are comparing it to the libraries listed below
Sorting:
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆192Updated this week
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 7 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆118Updated 3 months ago
- tool for requesting Entra ID's P2P certificate and authenticating remote Entra joinned devices with it☆114Updated last month
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆51Updated this week
- Impacket pre-compiled binaries☆16Updated last year
- ☆140Updated 2 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- ☆29Updated 10 months ago
- Client-side Encrypted Upload Server Python Script☆28Updated last week
- A python script that automates a C2 Profile build☆42Updated 3 months ago
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆25Updated 5 months ago
- OAuth Device Code Phishing Toolkit☆63Updated 2 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆83Updated 10 months ago
- Impersonate Tokens using only NTAPI functions☆77Updated 3 months ago
- ☆46Updated 3 months ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆15Updated 3 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆31Updated 6 months ago
- ☆132Updated 5 months ago
- A Python POC for CRED1 over SOCKS5☆151Updated 9 months ago
- ☆111Updated 7 months ago
- ☆56Updated 5 months ago
- AzureAD beacon object files☆120Updated 6 months ago
- C++ Reflective Assembly Loader☆27Updated 4 months ago
- ForsHops☆141Updated 3 months ago
- TokenCert☆98Updated 8 months ago
- Lateral movement with DCOM DLL hijacking☆120Updated last week
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- Utilities for obfuscating shellcode☆69Updated 4 months ago