two06 / CerealKiller
.NET deserialization hunter
☆76Updated 8 months ago
Alternatives and similar repositories for CerealKiller:
Users that are interested in CerealKiller are comparing it to the libraries listed below
- ☆48Updated 2 years ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆117Updated last month
- ☆54Updated last month
- To audit the security of read-only domain controllers☆114Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆110Updated 11 months ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆132Updated 6 months ago
- Lateral Movement☆123Updated last year
- ☆49Updated 4 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆43Updated 3 months ago
- ☆78Updated 7 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆46Updated 2 months ago
- Secretsdump C# version only supporting local (live) operation☆49Updated last year
- Abuse Azure API permissions for red teaming☆61Updated 2 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆63Updated last year
- TokenCert☆94Updated 4 months ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆73Updated 10 months ago
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆55Updated 3 months ago
- ☆86Updated 10 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆35Updated last year
- Execute commands in other Sessions☆85Updated 7 months ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆32Updated 5 months ago
- ☆103Updated last month
- Library of BOFs to interact with SQL servers☆160Updated 3 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- ☆47Updated last month
- Tool to aid in dumping LSASS process remotely☆38Updated 7 months ago
- A Python POC for CRED1 over SOCKS5☆144Updated 5 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆118Updated 5 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆47Updated last month