CiscoCXSecurity / linikatzLinks
linikatz is a tool to attack AD on UNIX
☆574Updated last year
Alternatives and similar repositories for linikatz
Users that are interested in linikatz are comparing it to the libraries listed below
Sorting:
- Active Directory ACL exploitation with BloodHound☆738Updated 3 years ago
- Exchange privilege escalations to Active Directory☆784Updated 2 years ago
- getsystem via parent process using ps1 & embeded c#☆425Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,031Updated 5 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆907Updated 3 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆387Updated 4 years ago
- NTLMv1 Multitool☆640Updated last week
- A (partial) Python rewriting of PowerSploit's PowerView☆1,027Updated 5 months ago
- Active Directory Integrated DNS dumping by any authenticated user☆1,050Updated 4 months ago
- An script to perform kerberos bruteforcing by using impacket☆454Updated 3 years ago
- ☆526Updated 2 years ago
- Responder Windows Version Beta☆543Updated last year
- socks4 reverse proxy for penetration testing☆608Updated 7 years ago
- Kerberoast attack -pure python-☆438Updated last year
- Standalone binaries for Linux/Windows of Impacket's examples☆735Updated 2 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆814Updated 4 months ago
- Generates malicious LNK file payloads for data exfiltration☆419Updated 8 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆887Updated 4 years ago
- Search for potential frontable domains☆634Updated 2 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆802Updated 2 years ago
- Tool to audit and attack LAPS environments☆891Updated 7 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆518Updated 2 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆554Updated last week
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆730Updated this week
- Malicious WMI Events using PowerShell☆390Updated 9 years ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,361Updated 2 years ago
- Active Directory information dumper via LDAP☆1,296Updated 4 months ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆283Updated 2 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,032Updated last year
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,386Updated 6 months ago