vysecurity / msmailprobe2
Office 365 and Exchange Enumeration Version 2
☆18Updated last year
Alternatives and similar repositories for msmailprobe2:
Users that are interested in msmailprobe2 are comparing it to the libraries listed below
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆38Updated last year
- SAM Dumping in C#☆48Updated 3 months ago
- Active Directory certificate abuse☆38Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- Secretsdump C# version only supporting local (live) operation☆47Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆35Updated last year
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆16Updated last year
- Parses Cobalt Strike malleable C2 profiles.☆55Updated last week
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- ProcExp Driver (Ab)use☆21Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆49Updated 3 months ago
- ☆25Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- CVE-2024-40711-exp☆40Updated 6 months ago
- Windows Persistence Toolkit in C#☆36Updated 2 years ago
- Lsass dumper evading (some) EDR detection☆23Updated last month
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆43Updated last month
- Aggressor script add-in for CobaltStrike to track file uploads☆36Updated 2 years ago
- ☆25Updated 5 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆21Updated 10 months ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆18Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated last year
- Groovy Post Exploitation☆20Updated 5 months ago
- ☆30Updated last month
- Click Once + App Domain☆61Updated last year
- Validates priv escalation of AD trusts☆39Updated 2 weeks ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆25Updated 8 months ago
- Active Directory certificate abuse.☆38Updated 3 years ago