• Stars
    star
    215
  • Rank 183,925 (Top 4 %)
  • Language
    PowerShell
  • Created about 4 years ago
  • Updated about 4 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls on their behalf.

Invoke-ZeroLogon

This code was heavily adapted from the C# implementation by the NCC Group's Full Spectrum Attack Simulation team and the original CVE published by Secura. This script can be run in two modes:

  1. When the reset parameter is set to True, the script will attempt to reset the target computerโ€™s password to the default NTLM hash (essentially an empty password).
  2. By default, reset is set to False and will simply scan if the target computer is vulnerable to the ZeroLogon exploit (CVE-2020-1472).

WARNING: Resetting the password of a Domain Controller is likely to break the network. DO NOT use the reset parameter against a production system unless you fully understand the risks and have explicit permission.

More Repositories

1

Starkiller

Starkiller is a Frontend for PowerShell Empire.
Vue
1,356
star
2

Beginners-Guide-to-Obfuscation

PowerShell
1,009
star
3

Moriarty

Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments.
C#
467
star
4

Malleable-C2-Profiles

Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.
333
star
5

Invoke-PrintDemon

This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.
PowerShell
197
star
6

DEFCON27

DEFCON 27 slides and workshop materials.
128
star
7

Offensive-VBA-and-XLS-Entanglement

VBA
124
star
8

IronSharpPack

IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then reflective load the C# project.
Python
104
star
9

Long-Live-The-Empire

A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing on the open-source Empire C2 framework.
97
star
10

ScriptBlock-Smuggling

Example code samples from our ScriptBlock Smuggling Blog post
C#
82
star
11

Empire-Cli

CLI Frontend for PowerShell Empire.
Python
44
star
12

Taming-Offensive-IronPython

This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it can be used to interact with other .NET languages.
Python
31
star
13

Red-Team-Village-CTF-2023

Secure Terminal CTF Challenge for DC31 Red Team Village
Python
19
star
14

SocksProxyServer-Plugin

Socks Proxy Server Plugin for Invoke-SocksProxy
17
star
15

DeathStarPlugin

Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common offensive tactics, techniques, and procedures (TTPs).
Python
15
star
16

empire-docs

https://bc-security.gitbook.io/empire-wiki/
12
star
17

DEFCONSafeMode

DEFCON Safe Mode Slides
8
star
18

ChiselServer-Plugin

5
star
19

DEFCON24

DEFCON 24 slides and materials.
4
star
20

intro-ctf

Dockerfile
4
star
21

Empire-Compiler

C#
3
star
22

Twilio-Plugin

Python
2
star
23

Empire-Launcher

Python
1
star
24

denylist-plugin

1
star
25

Report-Generation-Plugin

Plugin for replacing the original reporting functionality in Empire with customizable PDFs.
Python
1
star
26

AutoRun-Plugin

Plugin to automatically execute an agent tasking on checkin
1
star