Dump Kerberos tickets from the KCM database of SSSD
☆56Dec 31, 2025Updated 2 months ago
Alternatives and similar repositories for kcmdump
Users that are interested in kcmdump are comparing it to the libraries listed below
Sorting:
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- ☆18Mar 26, 2024Updated last year
- ☆53Oct 10, 2023Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆361Dec 13, 2025Updated 3 months ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆265Nov 22, 2025Updated 3 months ago
- ☆198Mar 28, 2025Updated 11 months ago
- a small script to collect information from a management point☆37Jan 19, 2026Updated 2 months ago
- Abusing Azure services over C2☆367Jan 20, 2026Updated 2 months ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆391Jan 20, 2026Updated 2 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆234Feb 12, 2025Updated last year
- Rust in-memory dumper☆108Jul 26, 2023Updated 2 years ago
- ☆163Oct 25, 2023Updated 2 years ago
- ☆109Feb 21, 2023Updated 3 years ago
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 5 months ago
- Evasive shellcode loader☆400Oct 17, 2024Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆216Oct 19, 2024Updated last year
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆385Apr 26, 2025Updated 10 months ago
- ☆58Dec 10, 2025Updated 3 months ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Nov 6, 2023Updated 2 years ago
- Generate and Manage KeyCredentialLinks☆253Mar 9, 2026Updated last week
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated 2 years ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- ☆38Apr 7, 2023Updated 2 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 7 months ago
- A BloodHound collector for Microsoft Configuration Manager☆393Jul 7, 2025Updated 8 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181May 19, 2025Updated 10 months ago
- miscellaneous codes☆36Sep 24, 2023Updated 2 years ago
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- ☆168Feb 29, 2024Updated 2 years ago
- Kerberos protocol attacker☆139Feb 1, 2021Updated 5 years ago
- Indirect syscalls + DInvoke made simple.☆95Dec 24, 2024Updated last year