Tool Reference

TOOOOOOOOOOLS :)

Sections Tool Reference

Reconnaissance & Enumeration

Credential Attacks

  • Impacket - Python toolkit for network protocols (includes all impacket-* tools below) https://github.com/fortra/impacket

    • impacket-GetUserSPNs (Kerberoasting)
    • impacket-GetNPUsers (AS-REP roasting)
    • impacket-secretsdump (credential dumping / DCSync)
    • impacket-getTGT (TGT request)
    • impacket-ticketer (ticket forging)
    • impacket-findDelegation (delegation enumeration)
    • impacket-lookupsid (SID/RID enumeration)
    • impacket-ntlmrelayx (NTLM relay)
    • impacket-psexec (remote execution via SMB)
    • impacket-wmiexec (remote execution via WMI)
    • impacket-smbexec (remote execution via SMB services)
    • impacket-atexec (remote execution via scheduled tasks)
    • impacket-dcomexec (remote execution via DCOM)
    • impacket-mssqlclient (MSSQL interactive client)
    • impacket-smbserver (SMB share server)
    • impacket-smbclient (SMB client)
    • impacket-addcomputer (machine account creation)
    • impacket-dpapi (DPAPI secret extraction)
  • Kerbrute - Kerberos username enumeration and password spraying https://github.com/ropnop/kerbrute

  • Hashcat - Password/hash cracking https://github.com/hashcat/hashcat

  • Responder - LLMNR/NBT-NS/mDNS poisoner and hash capture https://github.com/lgandx/Responder

  • lsassy - Remote LSASS dumping https://github.com/Hackndo/lsassy

  • pypykatz - Offline LSASS dump parser (Python mimikatz) https://github.com/skelsec/pypykatz

  • targetedKerberoast.py - Automated targeted Kerberoasting https://github.com/ShutdownRepo/targetedKerberoast

Coercion & Relay

Lateral Movement

Persistence & Post-Exploitation