abusing misconfiguration for AD with LAPS
☆11Jan 25, 2024Updated 2 years ago
Alternatives and similar repositories for Abusing_Laps_Toolkit
Users that are interested in Abusing_Laps_Toolkit are comparing it to the libraries listed below
Sorting:
- Chatting with a single gmail draft via the Gmail API☆13Mar 10, 2020Updated 6 years ago
- Active Directory Penetration Testing Tool☆29Nov 18, 2021Updated 4 years ago
- This Repository is for random Knicks and knacks - in relation to PowerShell scripts I have created for one task or another.☆16Jan 13, 2025Updated last year
- ☆17Dec 15, 2021Updated 4 years ago
- Enumeration from a non-domain joined Windows computer☆33Oct 20, 2024Updated last year
- A module apply registry keys using LGPO instead☆13Apr 23, 2023Updated 2 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 2 months ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 4 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago
- Docker container to automatically obtain letsencrypt both wildcard and regular certificates☆15Dec 24, 2023Updated 2 years ago
- Useful scripts to enable WinRM for a Windows Server and enables client certificate authentication☆13May 31, 2018Updated 7 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Sep 18, 2020Updated 5 years ago
- wsus scripts☆20Jul 2, 2018Updated 7 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- ☆17May 22, 2024Updated last year
- Give your WSUS server a thorough spring cleaning☆23Nov 16, 2025Updated 4 months ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Github action for monitoring CVE☆43Updated this week
- A quick PowerShell script to translate ADMX files into a more readable CSV file☆21Apr 9, 2017Updated 8 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- ☆56Sep 13, 2022Updated 3 years ago
- Local SYSTEM auth trigger for relaying☆170Jul 22, 2025Updated 8 months ago
- Python Duo Push API☆42May 31, 2025Updated 9 months ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆77Nov 10, 2025Updated 4 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Jan 13, 2025Updated last year
- Ready-to-use n8n automation workflows for business, AI, and productivity. Instantly boost efficiency with 22 templates—no coding needed!☆31Aug 8, 2025Updated 7 months ago
- ☆13Mar 3, 2025Updated last year
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆16Mar 9, 2026Updated last week
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Nov 3, 2021Updated 4 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- HackIgniter, PHP CodeIgniter Framework'ü üzerinde kodlanmış zafiyetli bir web uygulamasıdır. Uygulama üzerinde bulunan zafiyetler, sızma …☆15Sep 18, 2021Updated 4 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 7 months ago
- ☆29May 16, 2023Updated 2 years ago
- VirusTotal API client for node.js.☆15Jan 31, 2016Updated 10 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Jun 10, 2019Updated 6 years ago
- An Ansible collection that installs an SCCM deployment with optional configurations.☆101Dec 8, 2025Updated 3 months ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 6 years ago