Lists (7)
Sort Name ascending (A-Z)
Stars
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
Neo-reGeorg is a project that seeks to aggressively refactor reGeorg
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
👻Stowaway -- Multi-hop Proxy Tool for pentesters
pull decrypted ipa from jailbreak device
dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.
一款基于各大企业信息API的工具,解决在遇到的各种针对国内企业信息收集难题。一键收集控股公司ICP备案、APP、小程序、微信公众号等信息聚合导出。
Automation for internal Windows Penetrationtest / AD-Security
Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environments. The scripts automate various tasks including LDAP queryin…
DarkAngel 是一款全自动白帽漏洞扫描器,从hackerone、bugcrowd资产监听到漏洞报告生成、漏洞URL截屏、消息通知。
A repository of curated datasets from various attacks
Active Directory Integrated DNS dumping by any authenticated user
Python version of the C# tool for "Shadow Credentials" attacks
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
Investigate malicious Windows logon by visualizing and analyzing Windows event log
Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS
A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
Exchange your privileges for Domain Admin privs by abusing Exchange
CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability
An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.
ntlm relay attack to Exchange Web Services
Kerberos unconstrained delegation abuse toolkit