p0dalirius / winacl
winacl, a cross platforms Go library to work with ntSecurityDescriptor.
☆23Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for winacl
- Python3 rewrite of AsOutsider features of AADInternals☆35Updated 2 months ago
- A VSCode devcontainer for development of COFF files with batteries included.☆47Updated last year
- Asynchronous NFSv3 client in pure Python☆23Updated last week
- Dumping LSA secrets: a story about task decorrelation☆13Updated 4 months ago
- WhoAmI by asking the LDAP service on a domain controller.☆58Updated 2 years ago
- ☆51Updated 3 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆38Updated last year
- Bunch of BOF files☆24Updated 9 months ago
- An In-memory Embedding of CPython☆20Updated 3 years ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated last year
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆25Updated 3 years ago
- time-based user enum via Basic Auth in Azure☆28Updated last month
- Python module for running BOFs☆64Updated last year
- ☆14Updated 8 months ago
- A care package of useful bofs for red team engagments☆48Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆51Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- ☆47Updated last year
- ☆35Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆38Updated 11 months ago
- Scripts to interact with Microsoft Graph APIs☆31Updated 2 weeks ago
- Tool for Active Directory Certificate Services enumeration and abuse☆15Updated 9 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆51Updated 4 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆31Updated 3 weeks ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Click Once + App Domain☆62Updated 11 months ago
- Some of my custom "tools".☆22Updated 2 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆15Updated 2 months ago