zer1t0 / cerberoLinks
Kerberos protocol attacker
☆140Updated 5 years ago
Alternatives and similar repositories for cerbero
Users that are interested in cerbero are comparing it to the libraries listed below
Sorting:
- ☆142Updated 3 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆160Updated last year
- Coerce Windows machines auth via MS-EVEN☆171Updated 2 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆186Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Updated 3 years ago
- Simple C# implementation of PowerUpSQL☆95Updated last year
- C# version of Powermad☆170Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆183Updated 2 years ago
- Beacon Object File & C# project to check LDAP signing☆199Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆142Updated last year
- Pass the Hash to a named pipe for token Impersonation☆146Updated 4 years ago
- POC tools for exploring SMB over QUIC protocol☆130Updated 3 years ago
- ☆88Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆117Updated 2 years ago
- DLL Hijack Search Order Enumeration BOF☆150Updated 4 years ago
- A fake AMSI Provider which can be used for persistence.☆155Updated 4 years ago
- ADCS cert template modification and ACL enumeration☆144Updated 2 years ago
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆178Updated 4 years ago
- Just some Rust process injector POCs, nothing weird.☆81Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR