synacktiv / ntdissectorLinks
☆155Updated 2 months ago
Alternatives and similar repositories for ntdissector
Users that are interested in ntdissector are comparing it to the libraries listed below
Sorting:
- pysnaffler☆102Updated last month
- Malware As A Service☆135Updated last year
- ☆158Updated 6 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆190Updated 10 months ago
- ☆206Updated 2 months ago
- ☆193Updated 3 months ago
- ☆148Updated 4 months ago
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆68Updated last week
- Weaponizing DCOM for NTLM Authentication Coercions☆264Updated last month
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆177Updated 2 years ago
- ☆212Updated last year
- Python utility that generates "imageless" QR codes in various formats☆125Updated last year
- Parses Snaffler output file and generate beautified outputs.☆106Updated 7 months ago
- ☆119Updated 4 months ago
- Hybrid AD utilities for ROADtools☆86Updated 3 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆158Updated last year
- ☆300Updated 9 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated 3 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆205Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆239Updated 3 months ago
- Just some random Red Team Scripts that can be useful☆155Updated last year
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆169Updated 4 months ago
- Cortex XDR Config Extractor☆133Updated 2 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆164Updated 4 months ago
- ☆184Updated 9 months ago
- A small utility to translate NTDS.dit files to SQLite format.☆77Updated last year
- A Python POC for CRED1 over SOCKS5☆154Updated 10 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆191Updated last year
- Azure Post Exploitation Framework☆204Updated 5 months ago