two06 / CerealKillerLinks
.NET deserialization hunter
☆77Updated 11 months ago
Alternatives and similar repositories for CerealKiller
Users that are interested in CerealKiller are comparing it to the libraries listed below
Sorting:
- ☆52Updated 2 years ago
- To audit the security of read-only domain controllers☆117Updated last year
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆75Updated last week
- TokenCert☆98Updated 7 months ago
- ☆56Updated 4 months ago
- ☆50Updated 7 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆115Updated 2 months ago
- Lateral Movement☆124Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆48Updated 6 months ago
- ☆110Updated 7 months ago
- ☆80Updated last year
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 4 months ago
- Library of BOFs to interact with SQL servers☆182Updated 2 months ago
- ☆107Updated 4 months ago
- Execute commands in other Sessions☆89Updated 10 months ago
- ☆17Updated 6 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated last year
- SAM Dumping in C#☆48Updated 5 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆57Updated 3 weeks ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆74Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆122Updated 8 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆81Updated 9 months ago
- Lateral Movement via the .NET Profiler☆82Updated 7 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆54Updated 5 months ago
- ☆82Updated 10 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- Enumerate Domain Users Without Authentication☆36Updated 2 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year