Kerberos Party Tricks Logo

Kerberos Party Tricks

0
Free
Visit Website

This tool is designed to weaponize Kerberos protocol flaws by abusing vulnerabilities in the Kerberos v5 protocol, allowing for enumeration/brute force attacks on domain users and obtaining Kerberos TGS-REP and AS-REP tickets without sending packets to target systems, making the attacks stealthy and hard to detect.

FEATURES

ALTERNATIVES

Pupy is a cross-platform C2 and post-exploitation framework for remote access and control of compromised systems across various operating systems.

A guide on using Apache mod_rewrite to strengthen phishing attacks and bypass mobile device restrictions

A tool for security researchers and penetration testers to automate the process of finding sensitive information on a target domain.

Adversary emulation framework for testing security measures in network environments.

Generates randomized C2 profiles for Cobalt Strike to evade detection.

A collection of precompiled Windows exploits for privilege escalation.

A YARA interactive debugger for the YARA language written in Rust, providing features like function calls, constant evaluation, and string matching.

A payload creation framework designed to bypass Endpoint Detection and Response (EDR) systems.