rvazarkar / KrbCredExportLinks
Exports Kerberos KrbCred Tickets for use in Mimikatz/Beacon from a Kerberos CCache File
☆90Updated 10 years ago
Alternatives and similar repositories for KrbCredExport
Users that are interested in KrbCredExport are comparing it to the libraries listed below
Sorting:
- checkO365 is a tool to check if a target domain is using O365☆84Updated 7 years ago
- Malleable C2 profiles for Cobalt Strike☆73Updated 2 years ago
- ☆211Updated 6 years ago
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- Cobaltstrike Aggressor Scripts☆28Updated 8 years ago
- Kerberos TGS_REP cracker written in Golang☆56Updated 9 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆146Updated 5 years ago
- Active Directory pentest scripts☆122Updated 10 years ago
- CVE-2018-8581☆374Updated 2 years ago
- Basic password spraying tool for internal tests and red teaming☆90Updated 5 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆59Updated 8 years ago
- POC for Cobalt Strike external C2☆136Updated 3 years ago
- Use Waitfor.exe to maintain persistence☆54Updated 4 years ago
- Various Aggressor Scripts I've Created.☆149Updated 3 years ago
- Collection of scripts, binaries and the like to aid in WhiteList Evasion on a Microsoft Windows Network.☆128Updated 10 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆132Updated 7 years ago
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆193Updated 4 years ago
- Collection of Aggressor Scripts for Cobalt Strike☆172Updated 7 years ago
- Cobalt Strike aggressor scripts☆90Updated 7 years ago
- CoffeeShot: Avoid Detection with Memory Injection☆75Updated 7 years ago
- Cobalt Strike Aggressor Scripts☆143Updated 8 months ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- Aggressor Script to launch IE driveby for CVE-2018-4878☆87Updated 7 years ago
- Powershell to copy ntds.dit☆62Updated 9 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆143Updated 7 years ago
- CobaltStrike External C2 for Websockets☆198Updated 6 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆131Updated 5 months ago
- Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.☆39Updated 4 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆109Updated 6 years ago