zux0x3a / adfly
active directory query tool using LDAP Protocol , helps red teamer / penetration testers to validate users credentials , retrieve information about AD users , AD groups
☆12Updated 5 years ago
Alternatives and similar repositories for adfly:
Users that are interested in adfly are comparing it to the libraries listed below
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆51Updated 3 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- Magento Security Scanner☆15Updated 3 years ago
- ☆12Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Work in Progress repo☆14Updated 5 years ago
- parsers to make life easier☆12Updated 4 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- ☆20Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- ☆16Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 9 months ago
- Red Team C2 and Post Exploitation Code☆36Updated this week
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆14Updated last year
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- all published scripts devloped by ahmed khlief☆20Updated 4 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago