PingCastle - Get Active Directory Security at 80% in 20% of the time
-
Updated
Sep 25, 2024 - C#
PingCastle - Get Active Directory Security at 80% in 20% of the time
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
记录自己编写、修改的部分工具
A PowerShell tool that takes strong inspiration from CrackMapExec / NetExec
Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!
This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is created, it utilizes MINIDUMP_CALLBACK_INFORMATION callbacks to generate a memory dump of the cloned process
Perform DCSync operation without mimikatz
Red teaming tool PoC to dump LSASS memory, bypassing common countermeasures.
Python3 script to parse txt files containing Mimikatz output
PowerShellUtilities provides various utility commandlets.
Powerful script for logical obfuscation of powershell scripts
Invoke-KleptoKitty - Deploys Payloads and collects credentials
Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems
Add a description, image, and links to the mimikatz topic page so that developers can more easily learn about it.
To associate your repository with the mimikatz topic, visit your repo's landing page and select "manage topics."