zer1t0 / cerbero
Kerberos protocol attacker
☆129Updated 3 years ago
Alternatives and similar repositories for cerbero:
Users that are interested in cerbero are comparing it to the libraries listed below
- Coerce Windows machines auth via MS-EVEN☆154Updated last year
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆144Updated 10 months ago
- C# version of Powermad☆158Updated last year
- ☆139Updated 2 years ago
- Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File☆189Updated 4 years ago
- AV/EDR evasion via direct system calls.☆107Updated last year
- ADCS cert template modification and ACL enumeration☆131Updated last year
- Beacon Object File & C# project to check LDAP signing☆180Updated 5 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆125Updated 10 months ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆162Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆125Updated last year
- Reuse open handles to dynamically dump LSASS.☆236Updated 9 months ago
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆166Updated 3 years ago
- Rusty Impersonate☆94Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆171Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆80Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆89Updated 2 years ago
- COFF file (BOF) for managing Kerberos tickets.☆286Updated last year
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago
- Remove API hooks from a Beacon process.☆265Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆111Updated last year
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆135Updated 2 years ago
- Useful Cobalt Strike BOFs found or used during engagements☆136Updated last year
- ☆141Updated 2 years ago
- DLL Hijack Search Order Enumeration BOF☆141Updated 3 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆179Updated 2 years ago
- Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.☆174Updated 3 years ago
- Simple C# implementation of PowerUpSQL☆93Updated 6 months ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆185Updated 3 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆120Updated 2 years ago