Kerberos protocol attacker
☆139Feb 1, 2021Updated 5 years ago
Alternatives and similar repositories for cerbero
Users that are interested in cerbero are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆237Feb 12, 2025Updated last year
- A COFF loader made in Rust☆334Mar 14, 2026Updated last month
- Dynamically invoke arbitrary unmanaged code☆362Feb 19, 2026Updated 2 months ago
- Retrieve host information from NTLM☆32Feb 4, 2021Updated 5 years ago
- Reuse open handles to dynamically dump LSASS.☆247Apr 4, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆181Aug 4, 2021Updated 4 years ago
- C# Port of LdapRelayScan☆92Nov 26, 2025Updated 5 months ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆99Dec 8, 2022Updated 3 years ago
- .NET Project for Attacking vCenter☆559Nov 11, 2021Updated 4 years ago
- A rust library that allows you to host the CLR and execute dotnet binaries.☆235Mar 12, 2025Updated last year
- ADCS abuser☆320Feb 6, 2023Updated 3 years ago
- early cascade injection PoC based on Outflanks blog post, in rust☆63Nov 8, 2024Updated last year
- works but not work, cao!☆24Sep 4, 2021Updated 4 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆246May 5, 2024Updated 2 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆377Sep 20, 2025Updated 7 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆270Nov 22, 2025Updated 5 months ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆570Jun 5, 2023Updated 2 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆265Jun 29, 2024Updated last year
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆388Apr 26, 2025Updated last year
- A tool to help query AD via the LDAP protocol☆624Sep 25, 2024Updated last year
- Apply a divide and conquer approach to bypass EDRs☆287Oct 19, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions