FlyingPhish / ROADTools-AnalyserLinks
This python script performs a number of sqlite queries (mainly password metadata) against sqlite databases (Created by ROADtools) to provide analysis of account password hygene based on metadata.
☆22Updated 11 months ago
Alternatives and similar repositories for ROADTools-Analyser
Users that are interested in ROADTools-Analyser are comparing it to the libraries listed below
Sorting:
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- ☆44Updated 11 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆47Updated 3 months ago
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆33Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 7 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 9 months ago
- ☆52Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆76Updated 7 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆31Updated 2 months ago
- Simple C2 using GitHub repository as comms channel.☆31Updated 8 months ago
- ☆28Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 3 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆12Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Microsoft Graph API post-exploitation toolkit☆94Updated 11 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆57Updated 3 weeks ago
- ☆50Updated 7 months ago
- IP address filter by City☆11Updated 5 months ago
- ☆24Updated 8 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 4 months ago
- Enumerate the Domain for Readable and Writable Shares☆20Updated 4 months ago
- ☆70Updated last month
- ☆31Updated 3 weeks ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆39Updated last year
- ☆35Updated last year
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆37Updated 2 months ago