☆73Jul 22, 2017Updated 8 years ago
Alternatives and similar repositories for kerberoast
Users that are interested in kerberoast are comparing it to the libraries listed below
Sorting:
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 6 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆25Jun 17, 2017Updated 8 years ago
- Detect and abuse risky SPNs☆266Jun 15, 2017Updated 8 years ago
- ☆1,490Dec 31, 2022Updated 3 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆511Jun 22, 2022Updated 3 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Dec 29, 2017Updated 8 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆177Sep 18, 2018Updated 7 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- Powershell Persistence Locator☆67Sep 11, 2016Updated 9 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- PowerView menu for Cobalt Strike☆70Mar 22, 2018Updated 7 years ago
- ☆182Dec 18, 2018Updated 7 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆326Apr 26, 2020Updated 5 years ago
- Search for potential frontable domains☆643Mar 22, 2023Updated 2 years ago
- ☆229May 10, 2018Updated 7 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 7 years ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- Payload Generation Framework☆1,976Aug 21, 2024Updated last year
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- ☆350Feb 21, 2022Updated 4 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- Kerberos TGS_REP cracker written in Golang☆57Nov 18, 2015Updated 10 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- PowerShell Scripts I find useful☆776May 18, 2016Updated 9 years ago
- Collection of scripts, binaries and the like to aid in WhiteList Evasion on a Microsoft Windows Network.☆127May 27, 2015Updated 10 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- This repo contains Powershell scripts used for general hackery.☆581Dec 4, 2024Updated last year
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆113Oct 23, 2015Updated 10 years ago
- HTA encryption tool for RedTeams☆1,421Nov 9, 2022Updated 3 years ago