tothi / rbcd-attackLinks
Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket
☆590Updated 4 months ago
Alternatives and similar repositories for rbcd-attack
Users that are interested in rbcd-attack are comparing it to the libraries listed below
Sorting:
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆911Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆827Updated 2 years ago
- ☆817Updated 3 years ago
- Bypass for PowerShell Constrained Language Mode☆402Updated 4 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆397Updated 4 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆369Updated 5 years ago
- Dumping LAPS from Python☆284Updated 3 years ago
- "Golden" certificates☆705Updated last year
- Tools for Kerberos PKINIT and relaying to AD CS☆855Updated 11 months ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆448Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆527Updated last year
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆331Updated 3 years ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆662Updated 5 years ago
- BadAssMacros - C# based automated Malicous Macro Generator.☆433Updated 3 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆926Updated last year
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆349Updated last year
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,059Updated last year
- Standalone binaries for Linux/Windows of Impacket's examples☆745Updated 2 years ago
- Framework for Kerberos relaying☆933Updated 3 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆830Updated 2 months ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆867Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆237Updated 3 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆443Updated 3 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆385Updated last year
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆707Updated 3 months ago
- ☆474Updated 3 years ago
- An script to perform kerberos bruteforcing by using impacket☆456Updated 3 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆830Updated 3 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,050Updated 5 years ago
- Retrieve LAPS password from LDAP☆431Updated 4 years ago