Plus récents

🛠 Game Of Active Directory

GOAD is a vulnerable Active Directory environement for pentesters.

github.com/Orange-Cyberdefense

🛠 DFSCoerce : PoC for MS-DFSNM coerce authentication using NetrDfsRemoveStdRoot() method

github.com/Wh04m1001/DFSCoerce

🛠 DeepSleep is a variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC.

github.com/thefLink/DeepSleep

🛠 Hayabusa is a sigma-based threat hunting and fast forensics timeline generator for EVTX files.

github.com/Yamato-Security/hay

🛠 Get-UnJlaive is a tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.

github.com/Dump-GUY/Get-UnJlai

msImpersonate is a Python-native user impersonation tool that is capable of impersonating local or network user accounts with valid credentials.

github.com/dievus/msImpersonat

ldapsearch

Basic Usage

  • LDAP Search Filters
  • Interesting Attributes
  • Null Session Starting

Interesting Searches

  • LAPs Passwords
  • BitLocker Recovery Passwords
  • GMSA NT Hash
  • CA & Templates
  • Nested Group Membership
  • Find Exchange Servers
  • Deleted / Tombstoned objects
  • Replication Metadata

malicious.link/post/2022/ldaps

🔧 PassTheCert

A small PoC tool that allows authenticating against an LDAP/S server with a certificate.

🔧 pyCobaltHound

An aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Bloodhound

github.com/NVISOsecurity/pyCob

🔧 SMB Session Spoofing

Spoof SMB user sessions drawing attackers to a honey workstation.

github.com/Sq00ky/SMB-Session-

Plus anciens