AssuranceMaladieSec / AD-description-password-finderLinks
Retrieve AD accounts description and search for password in it
☆82Updated 3 years ago
Alternatives and similar repositories for AD-description-password-finder
Users that are interested in AD-description-password-finder are comparing it to the libraries listed below
Sorting:
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆84Updated 2 years ago
- ACL abuse swiss-knife☆127Updated 3 years ago
- Azure AD Password Checker☆86Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆115Updated 2 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Updated 3 years ago
- Microsoft Exchange password spray tool with proxy support.☆39Updated 4 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Updated 3 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆106Updated 2 years ago
- A RunAs clone with the ability to specify the password as an argument.☆112Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 3 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆58Updated 3 years ago
- Abuse Azure API permissions for red teaming☆71Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆178Updated 2 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆71Updated 2 years ago
- ☆121Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Duplicate not owned Token from Running Process☆74Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆89Updated 3 years ago
- Automated exploitation of MSSQL servers at scale☆127Updated last week
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- Tool for efficient directory enumeration☆65Updated last week
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135Updated 2 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆114Updated 4 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Updated 3 years ago
- ☆85Updated last year