slemire / WSPCoerce
PoC to coerce authentication from Windows hosts using MS-WSP
☆225Updated last year
Related projects ⓘ
Alternatives and complementary repositories for WSPCoerce
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆250Updated last year
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆252Updated 3 years ago
- ADCS cert template modification and ACL enumeration☆129Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆269Updated 3 months ago
- MS-FSRVP coercion abuse PoC☆274Updated 2 years ago
- Attempt at Obfuscated version of SharpCollection☆189Updated last week
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆163Updated last month
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆301Updated 8 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆166Updated last year
- ☆112Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆265Updated last week
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆292Updated 2 years ago
- My implementation of the GIUDA project in C++☆159Updated last year
- OPSEC safe Kerberoasting in C#☆188Updated 2 years ago
- ☆181Updated 7 months ago
- ☆207Updated 6 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆123Updated 8 months ago
- ☆151Updated last week
- Recovering NTLM hashes from Credential Guard☆327Updated last year
- ☆143Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆170Updated 8 months ago
- A collection of code snippets built to assist with breaking chains.☆115Updated 6 months ago
- Patch AMSI and ETW☆232Updated 6 months ago
- Timeroasting scripts by Tom Tervoort☆182Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆77Updated 2 years ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆396Updated 2 weeks ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆97Updated last year
- The Official Sliver Armory☆83Updated 3 months ago
- Extracting NetNTLM without touching lsass.exe☆224Updated 11 months ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆158Updated last year