srlabs / Certiception
An ADCS honeypot to catch attackers in your internal network.
☆284Updated 9 months ago
Alternatives and similar repositories for Certiception:
Users that are interested in Certiception are comparing it to the libraries listed below
- A BloodHound collector for Microsoft Configuration Manager☆311Updated 3 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆262Updated 2 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆333Updated 4 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆272Updated 7 months ago
- Some scripts to abuse kerberos using Powershell☆328Updated last year
- Assess the security of your Active Directory with few or all privileges.☆308Updated 2 weeks ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆250Updated last year
- An open-source self-hosted purple team management web application.☆265Updated this week
- ☆190Updated 6 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆409Updated 2 weeks ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆121Updated 2 months ago
- ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native exec…☆165Updated last month
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆180Updated 11 months ago
- ☆204Updated this week
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆149Updated last month
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆342Updated 2 months ago
- ☆174Updated 3 months ago
- Find potential DLL Sideloads on your windows computer☆193Updated 2 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆202Updated 3 months ago
- ☆315Updated 3 weeks ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆270Updated last year
- winPEAS, but for Active Directory☆148Updated this week
- Azure mindmap for penetration tests☆179Updated last year
- Abusing Intune for Lateral Movement over C2☆328Updated last month
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆185Updated this week
- ☆295Updated 2 weeks ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆734Updated 3 weeks ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆166Updated 6 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆351Updated last month
- Lab used for workshop and CTF☆177Updated last month