trustedsec / DitExplorer
Tool for viewing NTDS.dit
☆150Updated 2 weeks ago
Alternatives and similar repositories for DitExplorer:
Users that are interested in DitExplorer are comparing it to the libraries listed below
- ☆78Updated 8 months ago
- AzureAD beacon object files☆115Updated 3 months ago
- ☆125Updated last month
- ☆223Updated 10 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆192Updated 5 months ago
- Adversary Emulation Framework☆96Updated 8 months ago
- Lateral Movement☆122Updated last year
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆127Updated 3 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆85Updated 9 months ago
- ☆152Updated 3 months ago
- ☆117Updated this week
- ☆210Updated 5 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆118Updated last month
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆111Updated this week
- ☆105Updated 2 months ago
- ☆197Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆176Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆203Updated 3 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆118Updated 5 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆146Updated 10 months ago
- A Mythic agent for Windows written in C☆104Updated this week
- ☆86Updated 10 months ago
- A C# port from Invoke-GhostTask☆114Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆291Updated 4 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆107Updated 3 months ago
- ☆158Updated this week
- Remotely Enumerate sessions using undocumented Windows Station APIs☆113Updated 7 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 8 months ago
- ☆148Updated 8 months ago