two06 / CerealKiller
.NET deserialization hunter
☆77Updated 9 months ago
Alternatives and similar repositories for CerealKiller:
Users that are interested in CerealKiller are comparing it to the libraries listed below
- ☆48Updated 2 years ago
- ☆54Updated 2 months ago
- To audit the security of read-only domain controllers☆115Updated last year
- ☆50Updated 5 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆112Updated 3 weeks ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆37Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆43Updated 4 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆139Updated 2 months ago
- Lateral Movement☆122Updated last year
- TokenCert☆95Updated 5 months ago
- Secretsdump C# version only supporting local (live) operation☆48Updated this week
- ☆49Updated 2 months ago
- ☆55Updated 2 months ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆73Updated 11 months ago
- ☆80Updated 8 months ago
- Source code and examples for PassiveAggression☆54Updated 10 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆56Updated 4 months ago
- A Python POC for CRED1 over SOCKS5☆147Updated 6 months ago
- Tool to aid in dumping LSASS process remotely☆38Updated 8 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆15Updated 2 years ago
- ☆15Updated 3 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 8 months ago
- Get Fine Grained Password Policy☆70Updated last week
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆120Updated 6 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆35Updated last year
- Lateral Movement via the .NET Profiler☆81Updated 5 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 4 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆74Updated last month
- SAM Dumping in C#☆48Updated 3 months ago