ttpreport / ligolo-mp
Multiplayer pivoting solution
☆372Updated 3 weeks ago
Alternatives and similar repositories for ligolo-mp:
Users that are interested in ligolo-mp are comparing it to the libraries listed below
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆583Updated 10 months ago
- ☆331Updated last week
- Make everyone in your VLAN ASRep roastable☆190Updated 2 months ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆141Updated 2 months ago
- Just another Powerview alternative but on steroids☆681Updated last week
- Tool to remotely dump secrets from the Windows registry☆458Updated 2 months ago
- AD ACL abuse☆312Updated last month
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆334Updated 11 months ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆459Updated last month
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆515Updated 2 weeks ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆255Updated 8 months ago
- Windows remote execution multitool☆388Updated last week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆547Updated 5 months ago
- 🍊 Orange Tsai EventViewer RCE☆184Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆311Updated last year
- ☆301Updated 2 months ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆375Updated 7 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆301Updated 6 months ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆129Updated last year
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆182Updated last week
- A cheatsheet for NetExec☆119Updated 3 months ago
- DPAPI looting remotely and locally in Python☆457Updated last month
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆711Updated last year
- A tool to query for the existence of pre-windows 2000 computer objects.☆329Updated 3 weeks ago
- Amsi Bypass payload that works on Windwos 11☆377Updated last year
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆153Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆281Updated 4 months ago
- ☆253Updated 3 years ago
- Custom Queries - Brought Up to BH4.1 syntax☆251Updated 2 weeks ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆151Updated 2 years ago