Advertisement · 728 × 90

Posts by Rémi GASCOU (Podalirius)

Preview
GitHub - TheManticoreProject/gopengraph: A Go library to create BloodHound OpenGraphs easily A Go library to create BloodHound OpenGraphs easily - TheManticoreProject/gopengraph

gopengraph
A Go library to create BloodHound OpenGraphs easily
github.com/TheManticore... by @podalirius.bsky.social

5 months ago 1 1 0 0
Preview
ShareHound: An OpenGraph Collector for Network Shares - SpecterOps ShareHound is an OpenGraph collector for BloodHound CE and BloodHound Enterprise helping identify attack paths to network shares automatically.

See your network shares the way attackers do. 👀

Meet ShareHound, an OpenGraph collector for BloodHound CE & Enterprise that reveals share-level attack paths at scale.
@podalirius.bsky.social unpacks all the details in our latest blog post. ghst.ly/4ogiBqt

5 months ago 7 3 0 0
Post image

I'm happy to release a script gadgets wiki inspired by the work of @slekies, @kkotowicz, and @sirdarckcat in their Black Hat USA 2017 talk! 🔥

The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs 👇

gmsgadget.com

1/4

8 months ago 23 13 1 0
Preview
GitHub - TheManticoreProject/LDAPWordlistHarvester: A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory. A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory. - GitHub - TheManticoreProject/LDAPWordlistHarvester: A tool that allows you to extract a client-...

🔍 New tool in The Manticore Project: LDAPWordlistHarvester

This tool allows you to create precise wordlists for finding passwords of users in an Active Directory domain using its LDAP data.

➡️ github.com/TheManticore...

9 months ago 2 0 0 0
Preview
GitHub - p0dalirius/FindGPPPasswords: FindGPPPasswords, A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts. FindGPPPasswords, A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts. - p0dalirius/FindGPPPasswords

🚀 New pentest tool drop: FindGPPPasswords 🚀

A cross-platform tool to find & decrypt Group Policy Preferences passwords from SYSVOL with low-privileged domain accounts!

🔗 Check it out on GitHub: github.com/p0dalirius/F...

1 year ago 4 0 0 0
Preview
Sponsor @p0dalirius on GitHub Sponsors Support Podalirius's open source work in cybersecurity. He is regularly publishing opensource security tools to test for vulnerabilities on many environments, as well as wikis and defense techniques.

🚀 New Tool Release: DescribeNTSecurityDescriptor 🚀

Analyzing Windows NT Security Descriptors can be a headache. I built DescribeNTSecurityDescriptor, a cross-platform tool to decode, parse & visualize them easily!

🔗 GitHub: github.com/p0dalirius/DescribeNTSecurityDescriptor

1 year ago 3 1 0 0
Preview
WorstFit: Unveiling Hidden Transformers in Windows ANSI! 📌 This is a cross-post from DEVCORE. The research was first published at Black Hat Europe 2024. Personally, I would like to thank splitline, the co-author of this research & article, whose help

OMG, Orange Tsai released his latest new research 🤯 💣

blog.orange.tw/posts/2025-0...

1 year ago 34 20 3 2
Preview
GitHub - dirkjanm/BloodHound.py: A Python based ingestor for BloodHound A Python based ingestor for BloodHound. Contribute to dirkjanm/BloodHound.py development by creating an account on GitHub.

Few BloodHound python updates: LDAP channel binding is now supported with Kerberos auth (native) or with NTLM (custom ldap3 version). Furthermore, the BH CE collector now has its own pypi package and command. You can have both on the same system with pipx. github.com/dirkjanm/Blo...

1 year ago 29 14 2 0
Advertisement
Post image

New module on #NetExec : wam
Dump #Entra access tokens from Windows Token Broker Cache, and make your way to Entra 🚀

Thanks @xpnsec.com for the technique! More info on his blog : blog.xpnsec.com/wam-bam/

1 year ago 21 12 0 0
Post image

I'm glad to release the tool I have been working hard on the last month: #KrbRelayEx
A Kerberos relay & forwarder for MiTM attacks!
>Relays Kerberos AP-REQ tickets
>Manages multiple SMB consoles
>Works on Win& Linux with .NET 8.0
>...
GitHub: github.com/decoder-it/K...

1 year ago 63 43 3 0
Preview
Reverse Engineering iOS 18 Inactivity Reboot Wireless and firmware hacking, PhD life, Technology

How does the new iOS inactivity reboot work? What does it protect from?

I reverse engineered the kernel extension and the secure enclave processor, where this feature is implemented.

naehrdine.blogspot.com/2024/11/reve...

1 year ago 278 107 12 11

My current offline Web reading setup works quite well 😎
And I'll explain below how it works 🛠️🧵⬇️

1 year ago 3 3 1 0
Post image

LDAPmonitor by @podalirius.bsky.social - Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!

github.com/p0dalirius/L...

#infosec #pentest #redteam

1 year ago 2 1 0 0
Check out this free of charge recipe of how to loot bugs in Windows CHM parser. Not for the buck, but for the fun. Because fuzzing is fun. Never did fuzzing before? Just follow the article.

Check out this free of charge recipe of how to loot bugs in Windows CHM parser. Not for the buck, but for the fun. Because fuzzing is fun. Never did fuzzing before? Just follow the article.

Crashing Windows CHM Parser in Seconds Using WinAFL!
Article Highlight #1 - check it out in Paged Out #3 page 53
pagedout.institute/download/Pag...

2 years ago 1 1 0 0
Post image

Issue #3 is here after a long wait, new and shiny. You can download it here pagedout.institute?page=issues..... Tell us what you think.

2 years ago 2 3 0 0
Advertisement
Parsing the msDS-KeyCredentialLink value for ShadowCredentials attack In-depth explanation of the msDS-KeyCredentialLink attribute used in a shadow credentials attack, and how to parse it.

In my latest article, discover the depth of the msDS-KeyCredentialLink attribute used in ShadowCredentials attacks and how to parse it. Plus, discover a Python library, pydsinternals, that simplifies the parsing process.

Check it out ⤵️

podalirius.net/en/articles/...

2 years ago 2 2 0 0

You are doing your pentest engagements from a Windows machine? #LDAPWordlistHarvester is now available in powershell!

➡️ github.com/p0dalirius/L...

Happy password cracking!

2 years ago 2 1 0 0

Today I'm releasing #LDAPWordlistHarvester, a new tool for generate a wordlist based on the LDAP, in order to crack passwords of domain accounts. 🥳

➡️ github.com/p0dalirius/L...

The generated wordlist cracked way more passwords than rockyou2021 on my latest client.

2 years ago 1 1 1 0
Post image

Today I'm releasing the powershell version of #ExtractBitlockerKeys, aimed at system administrators.

You can backup your BitLocker recovery keys in CSV or JSON.

➡️ github.com/p0dalirius/E...

2 years ago 4 0 0 0
Post image

I wrote a new tool to extract all the Bitlocker recovery keys of computers enrolled in a Windows domain!

This is really useful in post-exploitation or system administration (to backup keys for example). Export in XLSX, SQLITE, JSON

github.com/p0dalirius/E...

Here is an example:

2 years ago 4 0 1 0