Pentester's Promiscuous Notebook
Blog
GitHub
Twitter
Search…
README
⚒️ Pentest
C2
Infrastructure
AD
ACL Abuse
AD CS Abuse
ADIDNS Abuse
Attack Trusts
AV / EDR Evasion
Authentication Coercion
Azure
Credentials Dump
From Memory
Credential Manager
DPAPI
Linux
LSA
NTDS
Password Filter
RDP
RPC
SAM
DCSync
Delegation Abuse
Discovery
DnsAdmins
Dominance
GPO Abuse
Kerberos
Key Credentials Abuse
LAPS
Lateral Movement
LDAP
NTLM
Password Spraying
Post Exploitation
PrivExchange
Privileges Abuse
RID Cycling
Roasting
SCCM Abuse
SMB
RPC
Token Manipulation
User Hunt
WSUS
Zerologon
DevOps
DBMS
Authentication Brute Force
File Transfer
IPMI
Kiosk Breakout
Low-Hanging Fruits
LPE
Networks
NFS
Persistence
Pivoting
Post Exploitation
SNMP
TFTP
VNC
Misc
OSINT
Password Brute Force
Perimeter
Shells
Web
Wi-Fi
⚔️ Red Team
Basics
Cobalt Strike
Infrastructure
Malware Development
SE
⚙️ Admin
Git
Linux
Networking
Virtualization
Windows
Powered By
GitBook
Credentials Dump
Tools
SessionGopher
https://github.com/Arvanaghi/SessionGopher
PS > Invoke-SessionGopher -Thorough
Gopher
https://github.com/EncodeGroup/Gopher
LaZagne
https://github.com/AlessandroZ/LaZagne
Cmd > .\lazagne.exe all [-v]
Cmd > .\lazagne.exe windows [-v]
Previous
Azure
Next
From Memory
Last modified
9mo ago
Copy link
Outline
Tools
SessionGopher
Gopher
LaZagne