kerberoasting
Here are 15 public repositories matching this topic...
A guide to help people who are new to penetration testing and are looking to gain an overview of the penetration testing process. This guide will help anyone hoping to take the CREST CRT or Offensive Security's OSCP exam and will aim to cover each stage of compromising a host.
-
Updated
Mar 31, 2024
This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.
-
Updated
Aug 20, 2023
Kerberos Attacks, obtaining password hashes. EXECTRINITY focuses on the acquisition of TGS, specifically services operating under accounts in Active Directory.
-
Updated
Sep 11, 2024 - C
Kerberoasting ( Kerberos Attacks ). From networks or Domain controller log perspective, since 𝗖𝗿𝗮𝗰𝗞𝗲𝗿𝗕𝗹𝗶𝘁𝘇 implements many parts of the normal Kerberos protocol, the main detection method involves the use of rc4_hmac in Kerberos exchanges.
-
Updated
Jun 30, 2024 - C#
Three headed dog, Kerberos Attacks. Cracking the system or router that provides a gateway for Active Directory.
-
Updated
May 13, 2024 - Python
Example of Kerberoasting Honeypot
-
Updated
Jan 6, 2023 - PowerShell
Combining 'authentication' and 'grilling' to convey. Active directory ( trust attack ). performing an advance Kerberos attack may result in user accounts being suspended. Therefore, the attackers should be careful with this attack method
-
Updated
Jun 2, 2024 - C#
内网集权系统渗透测试笔记
-
Updated
Oct 15, 2024
Offensive tool for guessing Active Directory credentials via Kerberos
-
Updated
Jan 1, 2024 - PowerShell
AD Authentication. Kerberos Attacks with ACL abuse capabilities. This CLI tool supports an attackers to perfrom a Kerberos Attacks and NTLM Relay Attacks
-
Updated
Sep 13, 2024 - C#
Kerberoasting and AS-REP Roasting
-
Updated
Jun 13, 2022
Kerberoasting
-
Updated
Jun 12, 2022
En este repositorio se encuentran los paso a paso para realizar algunos de los ataques más comunes en entorno de Active Directory. [En proceso...]
-
Updated
Sep 23, 2024
A tool written in Go to perform a few penetration testing techniques in the environment with Active Directory.
-
Updated
Jun 6, 2024 - PowerShell
Improve this page
Add a description, image, and links to the kerberoasting topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the kerberoasting topic, visit your repo's landing page and select "manage topics."