rmdavy / badodf
Creates a malicious ODF document help leak NetNTLM Creds
☆31Updated last year
Alternatives and similar repositories for badodf:
Users that are interested in badodf are comparing it to the libraries listed below
- ☆45Updated 7 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Exchangelib wrapper for pentesting☆64Updated 2 months ago
- ☆23Updated 5 years ago
- ☆22Updated 3 years ago
- ☆20Updated 3 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆39Updated 3 years ago
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆23Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- ☆52Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆88Updated last year
- Active Directory certificate abuse.☆38Updated 3 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Pwnage☆16Updated 2 months ago
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆1Updated 10 months ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- Automating payload generation for OSEP labs and exam.☆34Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Secretsdump C# version only supporting local (live) operation☆48Updated this week
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- ☆28Updated 3 years ago
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Updated last year
- ☆15Updated 3 years ago
- ☆48Updated 2 years ago
- Checks for signature requirements over LDAP☆97Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year