pypykatz Mimikatz implementation in pure Python Why do I need these dumps files? In order to create mimikatz in Python, one would have to create…
View More pypykatz v0.0.5 releases: Mimikatz implementation in pure PythonCategory: Post Exploitation
smbaudit: perform various SMB-related attacks
SMBAudit allows users to perform various SMB-related attacks across multiple Active Directory (AD) domains or hosts. SMBAudit is fully written in bash (require bash version…
View More smbaudit: perform various SMB-related attacksLaZagne v2.4.2 releases: Credentials recovery project
The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs,…
View More LaZagne v2.4.2 releases: Credentials recovery projectRubeus v1.4.0 releases: C# toolset for raw Kerberos interaction and abuses
Rubeus Rubeus is a C# toolset for raw Kerberos interaction and abuses. It is heavily adapted from Benjamin Delpy‘s Kekeo project (CC BY-NC-SA 4.0 license) and Vincent LE TOUX‘s MakeMeEnterpriseAdmin project (GPL v3.0…
View More Rubeus v1.4.0 releases: C# toolset for raw Kerberos interaction and abusesUACME v3.1.5 releases: Defeating Windows User Account Control
UACMe Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor. System Requirements x86-32/x64 Windows 7/8/8.1/10TH1/10TH2/10RS1/10RS2 (client, some methods, however, works on server version…
View More UACME v3.1.5 releases: Defeating Windows User Account ControlInvoke-Apex v1.0.3 releases: PowerShell-based toolkit for use in red team, post-exploitation
Invoke-Apex Invoke-Apex is a PowerShell-based toolkit consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security…
View More Invoke-Apex v1.0.3 releases: PowerShell-based toolkit for use in red team, post-exploitationPenTesters Framework(PTF) v2.2 released
As a penetration tester, I know that you usually choose to use Kali Linux like penetration testing distribution. Kali Linux is a powerful distribution. It…
View More PenTesters Framework(PTF) v2.2 releasedMemITM: Tool to make in memory man in the middle
What’s the MemITM tool? The MemITM (Mem In The Middle) tool has been developed in order to easily intercept “messages” in Windows processes memory. We…
View More MemITM: Tool to make in memory man in the middlelpeworkshop: Windows / Linux Local Privilege Escalation Workshop
Windows / Linux Local Privilege Escalation Workshop My give back to the community initiative that was presented for free at several private and public events…
View More lpeworkshop: Windows / Linux Local Privilege Escalation WorkshopPrivExchange: Exchange your privileges for Domain Admin privs by abusing Exchange
PrivExchange In most organisations using Active Directory and Exchange, Exchange servers have such high privileges that being an Administrator on an Exchange server is enough…
View More PrivExchange: Exchange your privileges for Domain Admin privs by abusing Exchange