This tool is designed to aid an operator in modifying ADCS certificate templates so that a created vulnerable state can …
BloodyAD – An Active Directory Privilege Escalation Framework
BloodyAD is an Active Directory Privilege Escalation Framework, it can be used manually using bloodyAD.py or automatically by combining pathgen.py …
Nosferatu – Lsass NTLM Authentication Backdoor
Lsass NTLM Authentication Backdoor How it Works First, the DLL is injected into the lsass.exe process, and will begin hooking …
RemotePotato0 – Just Another “Won’t Fix” Windows Privilege Escalation From User To Domain Admin
Just another “Won’t Fix” Windows Privilege Escalation from User to Domain Admin. RemotePotato0 is an exploit that allows you to …
NamedPipePTH – Pass The Hash To A Named Pipe For Token Impersonation
This project is a PoC code to use Pass-the-Hash for authentication on a local Named Pipe user Impersonation. There also …
SharpWebServer – HTTP And WebDAV Server With Net-NTLM Hashes Capture Functionality
A Red Team oriented simple HTTP & WebDAV server written in C# with functionality to capture Net-NTLM hashes. To be …
WordListGen – Super Simple Python Word List Generator For Fuzzing And Brute Forcing In Python
Super Simple Python Word List Generator for Password Cracking (Hashcat)!I know what your are thinking. Why create another word list …