Category: Post Exploitation

open-source post-exploitation framework

byob: open-source post-exploitation framework

BYOB BYOB is an open-source post-exploitation framework for students, researchers, and developers. It includes features such as: Pre-built C2 server Custom payload generator 12 post-exploitation modules It is designed to...

WDigest credential caching

WdToggle: enable WDigest credential caching

WdToggle A Proof of Concept Cobalt Strike Beacon Object File which uses direct system calls to enable WDigest credential caching and circumvent Credential Guard (if enabled). Additional guidance can be found in this blog post. Background...

WSMan-WinRM

WSMan-WinRM: executing remote commands over WinRM

WSMan-WinRM A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object. Windows Remote Management (WinRM) “is the Microsoft implementation of WS-Management...

ADSearch

ADSearch: query AD via the LDAP protocol

ADSearch A tool was written for cobalt-strike’s execute-assembly command that allows for more efficient querying of AD. Key Features List all Domain Admins Custom LDAP Search Connect to LDAPS Servers Output...

FullPowers

FullPowers: recovering the default privilege set of a service account

FullPowers FullPowers is a Proof-of-Concept tool I made for automatically recovering the default privilege set of a service account including SeAssignPrimaryToken and SeImpersonate. Rationale On Windows, some services executed as LOCAL SERVICE or NETWORK SERVICE are configured to run with...