CobblePot59 / ADcheck
Assess the security of your Active Directory with few or all privileges.
☆261Updated 2 weeks ago
Alternatives and similar repositories for ADcheck:
Users that are interested in ADcheck are comparing it to the libraries listed below
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆308Updated 2 months ago
- A BloodHound collector for Microsoft Configuration Manager☆301Updated last month
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆193Updated last month
- ☆173Updated 2 months ago
- Automated Active Directory Enumeration☆433Updated 3 weeks ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆177Updated 6 months ago
- Lab used for workshop and CTF☆172Updated 2 weeks ago
- Some scripts to abuse kerberos using Powershell☆327Updated last year
- winPEAS, but for Active Directory☆145Updated 3 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆273Updated 3 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆395Updated 3 weeks ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆131Updated 9 months ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆161Updated 4 months ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆217Updated 6 months ago
- Automatically run and populate a new instance of BH CE☆64Updated 4 months ago
- An ADCS honeypot to catch attackers in your internal network.☆280Updated 7 months ago
- Abusing Intune for Lateral Movement over C2☆325Updated last week
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆271Updated 3 months ago
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆364Updated last month
- ☆176Updated 2 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆163Updated 5 months ago
- Azure mindmap for penetration tests☆175Updated last year
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆247Updated 3 weeks ago
- Find potential DLL Sideloads on your windows computer☆175Updated last month
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆187Updated 2 months ago
- LDAP enumeration tool implemented in Python3☆224Updated 4 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆164Updated 5 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆194Updated 2 months ago
- ☆187Updated 4 months ago
- ☆191Updated last week