pkb1s / SharpAllowedToActLinks
Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)
☆191Updated 4 years ago
Alternatives and similar repositories for SharpAllowedToAct
Users that are interested in SharpAllowedToAct are comparing it to the libraries listed below
Sorting:
- Collection of tested Cobaltstrike aggressor scripts.☆118Updated 5 years ago
- c# implementation of Active Directory Integrated DNS dumping (authenticated user)☆203Updated 4 years ago
- Cobalt Strike Aggressor Scripts☆143Updated 6 months ago
- ☆176Updated 4 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆131Updated 6 years ago
- SMBExec C# module☆216Updated 4 years ago
- My CobaltStrike BOFS☆166Updated 2 years ago
- Beacon Object File (BOF) Creation Helper☆229Updated 3 years ago
- Cobalt Strike Aggressor extension for Visual Studio Code☆134Updated 11 months ago
- CSHARP DCOM Fun☆130Updated 5 years ago
- Print Spooler Named Pipe Impersonation for Cobalt Strike☆264Updated 4 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆183Updated 9 months ago
- Various Aggressor Scripts I've Created.☆149Updated 3 years ago
- Run shellcode from resource☆259Updated 4 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆271Updated 2 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆219Updated 2 years ago
- .NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy P…☆173Updated 5 years ago
- Programmatically create an administrative user under Windows☆180Updated 8 years ago
- Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File☆200Updated 4 years ago
- ☆209Updated 5 years ago
- ☆211Updated 6 years ago
- ☆113Updated 4 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆147Updated 4 years ago
- Search files for extensions as well as text within.☆120Updated 3 years ago
- Evading WinDefender ATP credential-theft☆256Updated 5 years ago
- C# version of Powermad☆166Updated last year
- ☆158Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆265Updated 4 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆122Updated 3 years ago
- ☆187Updated 4 years ago