CravateRouge / autobloody
Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound
☆400Updated 5 months ago
Related projects: ⓘ
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆695Updated last year
- Useful C2 techniques and cheatsheets learned from engagements☆415Updated last month
- Automate Active Directory Enumeration☆374Updated 2 weeks ago
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆385Updated last month
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆475Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆441Updated last year
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆360Updated last year
- Dump NTDS with golden certificates and UnPAC the hash☆613Updated 5 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆384Updated 2 months ago
- Tool to remotely dump secrets from the Windows registry☆388Updated last month
- Password spraying tool and Bloodhound integration☆203Updated last year
- Amsi Bypass payload that works on Windwos 11☆367Updated last year
- ☆172Updated 2 months ago
- LDAP enumeration tool implemented in Python3☆216Updated 2 weeks ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆323Updated last week
- Materials for the workshop "Red Team Ops: Havoc 101"☆325Updated last year
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆534Updated 2 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆539Updated 2 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆285Updated last year
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆264Updated 3 weeks ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆467Updated 2 months ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆187Updated last month
- ☆272Updated last year
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆447Updated 6 months ago
- DPAPI looting remotely and locally in Python☆406Updated last month
- ☆633Updated this week
- Kerberoast with ACL abuse capabilities☆306Updated last month
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆327Updated 6 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆135Updated last year
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆276Updated last year