Find more of my tools and research here:
CICADA8-Research Organization
ALL TOOLS AND OUR RESEARCH ARE POSTED FOR EDUCATIONAL PURPOSES ONLY. WE DO NOT APPROVE THEIR USE WITHOUT AUTHORIZATION TO CONDUCT PENTESTS.
Find more of my tools and research here:
CICADA8-Research Organization
ALL TOOLS AND OUR RESEARCH ARE POSTED FOR EDUCATIONAL PURPOSES ONLY. WE DO NOT APPROVE THEIR USE WITHOUT AUTHORIZATION TO CONDUCT PENTESTS.
Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
Some scripts to abuse kerberos using Powershell
Hide your P/Invoke signatures through other people's signed assemblies
Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)