From a30bb4d01774bbd0ca1c180488b8fdd6cb97e8e6 Mon Sep 17 00:00:00 2001 From: Meitar M Date: Thu, 14 May 2020 17:05:32 -0400 Subject: [PATCH] Add Rubeus, a Kerberos ticket cracker for Windows environments. --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 4499113..d19f98a 100644 --- a/README.md +++ b/README.md @@ -822,6 +822,7 @@ See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing). * [PowerSploit](https://github.com/PowerShellMafia/PowerSploit) - PowerShell Post-Exploitation Framework. * [RID_ENUM](https://github.com/trustedsec/ridenum) - Python script that can enumerate all users from a Windows Domain Controller and crack those user's passwords using brute-force. * [Responder](https://github.com/SpiderLabs/Responder) - Link-Local Multicast Name Resolution (LLMNR), NBT-NS, and mDNS poisoner. +* [Rubeus](https://github.com/GhostPack/Rubeus) - Toolset for raw Kerberos interaction and abuses. * [Ruler](https://github.com/sensepost/ruler) - Abuses client-side Outlook features to gain a remote shell on a Microsoft Exchange server. * [SCOMDecrypt](https://github.com/nccgroup/SCOMDecrypt) - Retrieve and decrypt RunAs credentials stored within Microsoft System Center Operations Manager (SCOM) databases. * [Sysinternals Suite](https://technet.microsoft.com/en-us/sysinternals/bb842062) - The Sysinternals Troubleshooting Utilities.