mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2025-02-18 13:54:09 -05:00
Add: nidem/kerberoast
This commit is contained in:
parent
89e0f7494f
commit
bd6e9410bb
21
README.md
21
README.md
@ -2102,14 +2102,6 @@ This repository is created as an online bookmark for useful links, resources and
|
||||
<td><a href="https://github.com/mattifestation/PoCSubjectInterfacePackage">mattifestation/PoCSubjectInterfacePackage</a></td>
|
||||
<td>A PoC subject interface package (SIP) provider designed to educate about the required components of a SIP provider.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/OmerYa/Invisi-Shell">OmerYa/Invisi-Shell</a></td>
|
||||
<td>Hide your Powershell script in plain sight. Bypass all Powershell security features</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/putterpanda/mimikittenz">putterpanda/mimikittenz</a></td>
|
||||
<td>A post-exploitation powershell tool for extracting juicy info from memory.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/mdsecactivebreach/Chameleon">mdsecactivebreach/Chameleon</a></td>
|
||||
<td>Chameleon: A tool for evading Proxy categorisation</td>
|
||||
@ -2142,10 +2134,18 @@ This repository is created as an online bookmark for useful links, resources and
|
||||
<td><a href="https://github.com/NetSPI/goddi">NetSPI/goddi</a></td>
|
||||
<td>goddi (go dump domain info) dumps Active Directory domain information</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/nidem/kerberoast">nidem/kerberoast</a></td>
|
||||
<td>Kerberoast is a series of tools for attacking MS Kerberos implementations. Below is a brief overview of what each tool does.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/outflanknl/Recon-AD">outflanknl/Recon-AD</a></td>
|
||||
<td>Recon-AD, an AD recon tool based on ADSI and reflective DLL’s</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/OmerYa/Invisi-Shell">OmerYa/Invisi-Shell</a></td>
|
||||
<td>Hide your Powershell script in plain sight. Bypass all Powershell security features</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/peewpw/Invoke-PSImage">peewpw/Invoke-PSImage</a></td>
|
||||
<td>Embeds a PowerShell script in the pixels of a PNG file and generates a oneliner to execute</td>
|
||||
@ -2158,6 +2158,11 @@ This repository is created as an online bookmark for useful links, resources and
|
||||
<td><a href="https://github.com/Plazmaz/LNKUp">Plazmaz/LNKUp</a></td>
|
||||
<td>Generates malicious LNK file payloads for data exfiltration</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/putterpanda/mimikittenz">putterpanda/mimikittenz</a></td>
|
||||
<td>A post-exploitation powershell tool for extracting juicy info from memory.</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td><a href="https://github.com/secretsquirrel/SigThief">secretsquirrel/SigThief</a></td>
|
||||
<td>Stealing Signatures and Making One Invalid Signature at a Time</td>
|
||||
|
Loading…
x
Reference in New Issue
Block a user