tothi / CVE-2021-1675
C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527
☆29Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2021-1675
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆77Updated 11 months ago
- Modified version of PEAS client for offensive operations☆38Updated last year
- ☆30Updated 4 years ago
- ☆68Updated last year
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆47Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 2 years ago
- (kinda) Malicious Outlook Reader☆17Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 2 years ago
- ☆41Updated 2 years ago
- Exchangelib wrapper for pentesting☆56Updated 5 months ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- A tool to password spray Jenkins instances☆52Updated 5 years ago
- Checks for signature requirements over LDAP☆92Updated 2 years ago
- ☆16Updated 3 years ago
- Pwnage☆15Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆23Updated 2 years ago
- Find Inbound Email Domains☆21Updated 11 months ago
- ☆24Updated 3 years ago
- Execute Mimikatz with different technique☆50Updated 3 years ago
- An Ansible role for installing Cobalt Strike.☆74Updated 3 months ago