Retrieve LAPS password from LDAP
☆441Feb 17, 2021Updated 5 years ago
Alternatives and similar repositories for SharpLAPS
Users that are interested in SharpLAPS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆469Mar 8, 2023Updated 3 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆873Mar 20, 2023Updated 3 years ago
- ☆181Feb 3, 2021Updated 5 years ago
- .NET Project for Attacking vCenter☆558Nov 11, 2021Updated 4 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Beacon Object File PoC implementation of KillDefender☆235Apr 12, 2022Updated 4 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆236Feb 15, 2021Updated 5 years ago
- ☆669Nov 17, 2021Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆848Dec 2, 2023Updated 2 years ago
- C# version of Powermad☆170Dec 5, 2023Updated 2 years ago
- Spray a hash via smb to check for local administrator access☆142Feb 7, 2021Updated 5 years ago
- .NET Project for performing Authenticated Remote Execution☆407Feb 8, 2023Updated 3 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆310Nov 29, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Red Team oriented C# Simple HTTP & WebDAV Server with Net-NTLM hashes capture functionality☆287Jun 26, 2023Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆423May 21, 2022Updated 3 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆822Dec 14, 2023Updated 2 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆132Sep 12, 2021Updated 4 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- Framework for Kerberos relaying☆945May 29, 2022Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆198Feb 1, 2021Updated 5 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,455Dec 18, 2022Updated 3 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆1,104Jul 26, 2021Updated 4 years ago
- c# implementation of Active Directory Integrated DNS dumping (authenticated user)☆206May 25, 2021Updated 4 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆251Mar 31, 2021Updated 5 years ago
- Self-developed tools for Lateral Movement/Code Execution☆721Aug 17, 2021Updated 4 years ago
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆635Oct 18, 2025Updated 6 months ago
- ☆482Nov 20, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆938Nov 11, 2024Updated last year
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Sep 29, 2021Updated 4 years ago
- Get file less command execution for lateral movement.☆637Jun 3, 2022Updated 3 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆597Jul 26, 2021Updated 4 years ago
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆203Jul 14, 2021Updated 4 years ago
- Collection of Beacon Object Files☆636Nov 1, 2022Updated 3 years ago