Check if MS-RPRN is remotely available with powershell/c#
☆179Oct 21, 2018Updated 7 years ago
Alternatives and similar repositories for SpoolerScanner
Users that are interested in SpoolerScanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,104May 29, 2024Updated last year
- Run Rubeus via Rundll32☆208Apr 25, 2020Updated 5 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 7 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- ☆527Sep 15, 2022Updated 3 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- Create a minidump of the LSASS process from memory☆261Nov 2, 2022Updated 3 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,564Mar 11, 2026Updated 3 weeks ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,449Jan 11, 2023Updated 3 years ago
- A little scanner to check the LDAP Signing state☆46Aug 2, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆198Feb 1, 2021Updated 5 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- DAFT: Database Audit Framework & Toolkit☆182Aug 11, 2021Updated 4 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,319Dec 15, 2020Updated 5 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A C# tool for enumerating remote access policies through group policy.☆73Apr 18, 2019Updated 6 years ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆880Mar 29, 2021Updated 5 years ago
- ☆350Feb 21, 2022Updated 4 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆382Jul 25, 2019Updated 6 years ago
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆303Mar 4, 2020Updated 6 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader☆1,314Oct 1, 2019Updated 6 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆209Sep 25, 2018Updated 7 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆935Nov 11, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.☆1,404Jun 27, 2024Updated last year
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,617Jul 10, 2023Updated 2 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,582Jan 5, 2021Updated 5 years ago
- Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration feature…☆303Apr 25, 2023Updated 2 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆810Aug 28, 2022Updated 3 years ago
- A C# penetration testing tool to discover low-haning web fruit via web requests.☆91May 26, 2022Updated 3 years ago