A swiss army knife for pentesting networks
-
Updated
Dec 6, 2023 - Python
A swiss army knife for pentesting networks
Investigate malicious Windows logon by visualizing and analyzing Windows event log
The Network Execution Tool
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
AD Security Intrusion Detection System
Bloodhound Reporting for Blue and Purple Teams
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
A (partial) Python rewriting of PowerSploit's PowerView
Modern tactical exploitation toolkit.
Collection of knowledge about information security
Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE accesses.
A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.
An LDAP based Active Directory user and group enumeration tool
A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel
Web UI for managing users and groups in multiple directory services.
A script to dump files and folders remotely from a Windows SMB share.
Add a description, image, and links to the active-directory topic page so that developers can more easily learn about it.
To associate your repository with the active-directory topic, visit your repo's landing page and select "manage topics."