- Germany
- https://benzammour.com/
Highlights
- Pro
🪟 Windows/AD Security
Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by…
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Executes PowerShell from an unmanaged process
The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
Tool for Active Directory Certificate Services enumeration and abuse
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
StandIn is a small .NET35/45 AD post-exploitation toolkit
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
Windows Privilege Escalation from User to Domain Admin.
Empire is a PowerShell and Python post-exploitation agent.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.