0xJs / domain_audit
Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.
☆162Updated 5 months ago
Alternatives and similar repositories for domain_audit:
Users that are interested in domain_audit are comparing it to the libraries listed below
- ☆174Updated 3 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆165Updated 6 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆317Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year
- Some scripts to abuse kerberos using Powershell☆328Updated last year
- ☆177Updated 3 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆141Updated last year
- LDAP enumeration tool implemented in Python3☆226Updated 5 months ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆254Updated 2 years ago
- ☆141Updated 3 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆329Updated 3 months ago
- Azure AD cheatsheet for the CARTP course☆108Updated 2 years ago
- ☆96Updated 2 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆110Updated 9 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆180Updated 7 months ago
- ☆159Updated last year
- Table of AD and Azure assets and whether they belong to Tier Zero☆215Updated last month
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆149Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- ☆312Updated 2 weeks ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆220Updated 7 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆148Updated 2 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆488Updated 2 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆345Updated 2 years ago
- Active Directory delegation management tool☆291Updated last year
- Automatically run and populate a new instance of BH CE☆67Updated last week
- Automated Active Directory Enumeration☆436Updated last week
- A BloodHound collector for Microsoft Configuration Manager☆307Updated 2 months ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆154Updated 8 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆109Updated 7 months ago