synacktiv / ica2tcp
A SOCKS proxy for Citrix.
☆94Updated 2 years ago
Alternatives and similar repositories for ica2tcp:
Users that are interested in ica2tcp are comparing it to the libraries listed below
- Get Fine Grained Password Policy☆69Updated 11 months ago
- ☆140Updated 2 years ago
- ☆92Updated 2 years ago
- C# version of NTLMRawUnHide☆72Updated 2 years ago
- ☆84Updated 3 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆52Updated 10 months ago
- ☆88Updated 2 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆121Updated 3 years ago
- ☆71Updated last year
- Checks for signature requirements over LDAP☆96Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆89Updated 11 months ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆83Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆142Updated 3 years ago
- C# Port of LdapRelayScan☆80Updated 3 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆134Updated 6 months ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆55Updated 4 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆130Updated last year
- Beacon Object File & C# project to check LDAP signing☆189Updated 8 months ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆73Updated 11 months ago
- ☆88Updated 2 years ago
- ADCS cert template modification and ACL enumeration☆135Updated last year
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆179Updated 2 years ago
- Exchangelib wrapper for pentesting☆63Updated last month
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆55Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆61Updated 3 years ago
- POC tools for exploring SMB over QUIC protocol☆122Updated 3 years ago
- UI for creating LNKs☆103Updated 3 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 6 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated last year