slemire / WSPCoerce
PoC to coerce authentication from Windows hosts using MS-WSP
☆230Updated last year
Alternatives and similar repositories for WSPCoerce:
Users that are interested in WSPCoerce are comparing it to the libraries listed below
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆252Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆287Updated 4 months ago
- ☆193Updated 11 months ago
- Attempt at Obfuscated version of SharpCollection☆205Updated last month
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆270Updated 3 years ago
- ADCS cert template modification and ACL enumeration☆135Updated last year
- ☆158Updated 4 months ago
- OPSEC safe Kerberoasting in C#☆190Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆175Updated last year
- ☆116Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆287Updated 4 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆192Updated 5 months ago
- My implementation of the GIUDA project in C++☆180Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆320Updated last year
- ☆148Updated last month
- Recovering NTLM hashes from Credential Guard☆333Updated 2 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆127Updated last year
- Use ESC1 to perform a makeshift DCSync and dump hashes☆203Updated last year
- A collection of code snippets built to assist with breaking chains.☆118Updated 10 months ago
- ☆223Updated 10 months ago
- Payload Generation Framework☆89Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆69Updated 7 months ago
- MS-FSRVP coercion abuse PoC☆287Updated 3 years ago
- Patching AmsiOpenSession by forcing an error branching☆143Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆200Updated 3 months ago
- COFF file (BOF) for managing Kerberos tickets.☆293Updated last year
- ☆161Updated 7 months ago
- Patch AMSI and ETW☆237Updated 10 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆117Updated last month