Certify icon indicating copy to clipboard operation
Certify copied to clipboard

Active Directory certificate abuse.

Results 26 Certify issues
Sort by recently updated
recently updated
newest added

See https://github.com/GhostPack/Certify/pull/8#issuecomment-1166334891

Hello, Let me start off stating that I am far from a Visual Studio expert but I have successfully built projects before, including Rubeus. I have installed Visual Studio 2019...

Hi, Probably you already aware about problems related to running certify in non domain machine. Even if I tried different test cases (runas, netonly, ptt, cmd over pth) each time...

The latest commit (on Visual Studio 2019) introduces a bug for the 7th check, specifically CS8629. A quick check to make sure it isn't null fixes it. Figured I'd send...

Two new commands have been added in order to replicate PSPKI functionalities to perform the ESC7 attack: - setconfig: It allows to abuse ManageCA permission to both enable EDITF_ATTRIBUTESUBJECTALTNAME2 and...

Seems to be issues handling CA-NAME with spaces included. The graves accent nor quotations resolve the issue

Hi. To prevent the trouble of converting pem output with `openssl`, I added the functionality to output pfx in Base64 format to the `request` command. The added options are following:...

Hi. Thank you very much for your effort that went into all this research! I am trying to abuse ESC6 from a non domain-joined machine. I am aware of the...

As discussed on BH slack: Compiled Certify on Win10 2004 with VS2019. Executed via Cobalt Strike's execute-assembly on Windows Server 2012R2. `Certify.exe find /vulnerable` appeared to work fine. `Certify.exe request...

Hi, I was trying out some requests and an exception is returned during execution. Compiled on Windows Server 2022 with VS2019. `.\Certify.exe find /vulnerable` or `.\Certify.exe find /clientauth` works fine....