rvazarkar / KrbCredExport
Exports Kerberos KrbCred Tickets for use in Mimikatz/Beacon from a Kerberos CCache File
☆89Updated 9 years ago
Alternatives and similar repositories for KrbCredExport:
Users that are interested in KrbCredExport are comparing it to the libraries listed below
- ☆207Updated 6 years ago
- Malleable C2 profiles for Cobalt Strike☆68Updated 2 years ago
- Various Aggressor Scripts I've Created.☆148Updated 3 years ago
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆186Updated 3 years ago
- Collection of Aggressor Scripts for Cobalt Strike☆171Updated 6 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆129Updated 6 years ago
- A collection of useful scripts for Cobalt Strike☆168Updated 5 months ago
- Cobalt Strike Aggressor Scripts☆139Updated 2 months ago
- Active Directory pentest scripts☆122Updated 9 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆177Updated 5 months ago
- Aggressor Scripts for Cobalt Strike☆77Updated 10 months ago
- ☆73Updated 7 years ago
- POC for Cobalt Strike external C2☆122Updated 3 years ago
- cve-2019-0604 SharePoint RCE exploit☆101Updated 5 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆144Updated 6 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆143Updated 4 years ago
- checkO365 is a tool to check if a target domain is using O365☆84Updated 6 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 6 years ago
- c# implementation of Active Directory Integrated DNS dumping (authenticated user)☆200Updated 3 years ago
- Basic password spraying tool for internal tests and red teaming☆89Updated 4 years ago
- NTDS.dit offline dumper with non-elevated☆213Updated 7 years ago
- CVE-2018-8581☆371Updated 2 years ago
- CobaltStrike External C2 for Websockets☆194Updated 5 years ago
- Contains poc's and my research works☆31Updated last year
- Kerberos TGS_REP cracker written in Golang☆54Updated 9 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆57Updated 7 years ago
- Collection of Windows Hacking Binaries☆49Updated 9 years ago
- PowerView menu for Cobalt Strike☆67Updated 6 years ago
- Collection of scripts, binaries and the like to aid in WhiteList Evasion on a Microsoft Windows Network.☆129Updated 9 years ago
- Cobaltstrike Aggressor Scripts☆28Updated 7 years ago