Enumerate AD through LDAP with a collection of helpfull scripts being bundled
☆145Mar 17, 2026Updated this week
Alternatives and similar repositories for ActiveDirectoryEnumeration
Users that are interested in ActiveDirectoryEnumeration are comparing it to the libraries listed below
Sorting:
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆622Aug 15, 2025Updated 7 months ago
- ☆127Jun 19, 2020Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆309Jul 4, 2023Updated 2 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆317Dec 19, 2023Updated 2 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Aug 25, 2020Updated 5 years ago
- Finding SSL Blindspots for Red Teams☆34Jul 28, 2020Updated 5 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Active Directory ACL exploitation with BloodHound☆756Nov 18, 2021Updated 4 years ago
- Collection of VBA macro published in our twitter / blog☆157Sep 5, 2022Updated 3 years ago
- Penetration testing utility and antivirus assessment tool.☆315Apr 25, 2023Updated 2 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆635Oct 18, 2025Updated 5 months ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆232Oct 4, 2020Updated 5 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- ☆197Mar 19, 2020Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆236Feb 15, 2021Updated 5 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- A little tool to play with Outlook☆207Nov 11, 2021Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- ☆667Nov 17, 2021Updated 4 years ago
- Nuubi Tools (Information-ghatering|Scanner|Recon.)☆87Jun 27, 2020Updated 5 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆444Aug 18, 2023Updated 2 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- C# program to take a full size screenshot or a recording of the user's desktop. Takes in 0-3 flags☆84Oct 2, 2020Updated 5 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆355Dec 1, 2020Updated 5 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,451Dec 18, 2022Updated 3 years ago
- A (partial) Python rewriting of PowerSploit's PowerView☆1,105Mar 5, 2026Updated 2 weeks ago
- Sustainable shellcode evasion☆113Updated this week
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Sep 23, 2020Updated 5 years ago