p0dalirius / pyDescribeNTSecurityDescriptorLinks
A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.
☆24Updated last month
Alternatives and similar repositories for pyDescribeNTSecurityDescriptor
Users that are interested in pyDescribeNTSecurityDescriptor are comparing it to the libraries listed below
Sorting:
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆137Updated 2 months ago
- adws enumeration bof☆137Updated last week
- ☆148Updated 5 months ago
- Internal Monologue BOF☆74Updated 9 months ago
- Impacket pre-compiled binaries☆17Updated 2 years ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆131Updated 3 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆117Updated last year
- Local SYSTEM auth trigger for relaying☆163Updated 2 months ago
- ☆29Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆145Updated 6 months ago
- AzureAD beacon object files☆129Updated 9 months ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Updated 3 years ago
- A python script that automates a C2 Profile build☆48Updated last month
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆40Updated 10 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆124Updated last month
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆53Updated last week
- Dump Kerberos tickets☆40Updated 2 months ago
- ForsHops☆149Updated 6 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆167Updated 9 months ago
- C++ Reflective Assembly Loader☆28Updated 7 months ago
- Lateral Movement Bof with MSI ODBC Driver Install☆106Updated 2 weeks ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 4 months ago
- A hoontr must hoont☆98Updated 2 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆42Updated 3 months ago
- OAuth Device Code Phishing Toolkit☆90Updated last month
- Lateral movement with DCOM DLL hijacking☆158Updated 3 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆91Updated last year
- SCEP request tool for AD CS and Intune☆69Updated 2 months ago
- ☆57Updated 7 months ago
- 🧠 The ultimate, community-curated resource for Beacon Object Files (BOFs) — tutorials, how-tos, deep dives, and reference materials.☆88Updated last week