Coercer
GPL-2.0🔥 Offensive Ops · Python
Coercer is an automated tool designed to locate and exploit Windows authentication coercion vulnerabilities. It specifically targets vulnerabilities such as PetitPotam and PrinterBug, which can be exploited to relay NTLM authentication requests. By automating the discovery and exploitation process, Coercer assists attackers and security testers in assessing the security posture of Active Directory environments against these types of threats.
Installation
$ pip install coercerUse Cases
- Windows authentication coercion exploitation
- NTLM relay attack setup via forced authentication
- PetitPotam, PrinterBug, and DFSCoerce automation
- Active Directory privilege escalation chains
Tags
Details
- Category
- 🔥 Offensive Ops
- Language
- Python
- Repository
- p0dalirius/Coercer
- License
- GPL-2.0
- Platforms
- 🐧linux🍎macos
Links
Alternatives & Comparisons
More in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.
BeEF
RubyBrowser Exploitation Framework. Hook browsers via XSS, then pivot into the network using browser-based attacks.