vdohney / keepass-password-dumperLinks
Original PoC for CVE-2023-32784
☆643Updated last year
Alternatives and similar repositories for keepass-password-dumper
Users that are interested in keepass-password-dumper are comparing it to the libraries listed below
Sorting:
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆786Updated 3 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆618Updated 7 months ago
- A python tool to automate KeePass discovery and secret extraction.☆491Updated 6 months ago
- Dumping DPAPI credz remotely☆1,149Updated 3 months ago
- Windows Local Privilege Escalation Cookbook☆1,131Updated 5 months ago
- Script for generating revshells☆472Updated 9 months ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,033Updated 7 months ago
- Dominate Active Directory with PowerShell.☆989Updated this week
- Redeye is a tool intended to help you manage your data during a pentest operation☆466Updated 10 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆577Updated 7 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,006Updated last week
- A RedTeam Toolkit☆400Updated 2 months ago
- ☆494Updated last year
- a tool to help operate in EDRs' blind spots☆739Updated 6 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆719Updated 2 years ago
- Just another Powerview alternative but on steroids☆726Updated this week
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆925Updated last month
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,169Updated last year
- Another Windows Local Privilege Escalation from Service Account to System☆868Updated 2 years ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆982Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,187Updated last year
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆795Updated last year
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,751Updated this week
- Awesome EDR Bypass Resources For Ethical Hacking☆1,224Updated 2 weeks ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆373Updated 4 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,674Updated 7 months ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆544Updated last year
- CVE-2023-24055 PoC (KeePass 2.5x)☆254Updated 2 years ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆425Updated 3 months ago
- Send phishing messages and attachments to Microsoft Teams users☆1,081Updated last year