xct / winpspy
CLI monitor for windows process- & file activity
☆85Updated 4 years ago
Alternatives and similar repositories for winpspy:
Users that are interested in winpspy are comparing it to the libraries listed below
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆56Updated 2 years ago
- SeManageVolumePrivilege to SYSTEM☆98Updated last year
- generate payloads that force authentication against an attacker machine☆105Updated 2 years ago
- A collection of code snippets built to assist with breaking chains.☆117Updated last year
- SeRestorePrivilege to SYSTEM☆106Updated 3 years ago
- Payload Generation Framework☆91Updated last year
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Precompiled executable☆53Updated 2 months ago
- ☆31Updated 3 years ago
- Make everyone in your VLAN ASRep roastable☆186Updated last month
- ☆110Updated last year
- ☆77Updated 5 years ago
- A cheatsheet for NetExec☆116Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.☆71Updated 8 months ago
- ☆81Updated 4 years ago
- ☆159Updated 5 months ago
- Impacket is a collection of Python classes for working with network protocols.☆280Updated 3 months ago
- AV EVASION TECHNIQUES☆79Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 2 years ago
- ☆58Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆119Updated 4 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆274Updated last year
- Python setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆105Updated 5 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆128Updated last year
- Attempt at Obfuscated version of SharpCollection☆206Updated last week
- Code dump from PEN-300/OSEP updated 2022☆40Updated 2 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆150Updated last week
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 3 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆113Updated 3 months ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆152Updated 2 years ago