tijldeneut / dianaLinks
Diana Credential Recovery Framework
☆58Updated last month
Alternatives and similar repositories for diana
Users that are interested in diana are comparing it to the libraries listed below
Sorting:
- ☆28Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 3 months ago
- Living Off the Foreign Land setup scripts☆70Updated 4 months ago
- ☆38Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- ☆33Updated last year
- Discord C2 Profile for Mythic☆29Updated 4 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆76Updated 7 months ago
- ☆44Updated 11 months ago
- BloodHound PowerShell client☆56Updated 2 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- ☆54Updated 6 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- A PoC for achieving persistence via push notifications on Windows☆46Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- tool for requesting Entra ID's P2P certificate and authenticating remote Entra joinned devices with it☆70Updated last week
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- ☆71Updated last week
- ☆51Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 7 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 4 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated 2 years ago
- ☆118Updated 3 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 3 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆95Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆33Updated last year
- Microsoft Graph API post-exploitation toolkit☆94Updated 11 months ago