kekeo
A little toolbox to play with Microsoft Kerberos in C (by gentilkiwi)
Certify
Active Directory certificate abuse. (by GhostPack)
kekeo | Certify | |
---|---|---|
3 | 5 | |
1,322 | 1,375 | |
- | 2.0% | |
0.0 | 0.0 | |
over 2 years ago | 5 months ago | |
C | C# | |
- | GNU General Public License v3.0 or later |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kekeo
Posts with mentions or reviews of kekeo.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-01-20.
-
How to Detect Pass-the-Ticket Attacks
Mimikatz can be used to perform pass-the-ticket, but in this post, we wanted to show how to execute the attack using another tool, Rubeus , lets you perform Kerberos based attacks. Rubeus is a C# toolset written by harmj0y and is based on the Kekeo project by Benjamin Delpy, the author of Mimikatz .
-
Account Persistence - Certificates
Tools: Certify , Rubeus & Kekeo
- gentilkiwi/kekeo - A little toolbox to play with Microsoft Kerberos in C
Certify
Posts with mentions or reviews of Certify.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-04-29.
-
Pentester PSA: Check your Active Directory Certificate Services (AD CS) For Vulnerabilities
I definitely recommend running Certipy or Certify (compiled binary) to see if you can identify any vulnerabilities in your environment. As far as I know, this stuff won't come up on a Nessus scan. I know when I was a sysadmin I set this up insecurely (has now been fixed). However, AD CS is easy to set up ADCS knowing some of the security implications of the configurations.
-
Account Persistence - Certificates
Tools: Certify , Rubeus & Kekeo
- Wir schreiben für das c't-Magazin über Hacking und IT-Sicherheit - fragt uns alles! (Beginn 17 Uhr)
- GitHub - GhostPack/Certify: Active Directory certificate abuse.
What are some alternatives?
When comparing kekeo and Certify you can also consider the following projects:
Rubeus - Trying to tame the three-headed dog.
Powershell - Powershell scripts
wstg - The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Certipy - Tool for Active Directory Certificate Services enumeration and abuse
CVE-2022-26923_AD-Certificate-Services - The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.