GoSecure / ldap-scannerLinks
Checks for signature requirements over LDAP
☆98Updated 3 years ago
Alternatives and similar repositories for ldap-scanner
Users that are interested in ldap-scanner are comparing it to the libraries listed below
Sorting:
- Convert Cobalt Strike profiles to IIS web.config files☆115Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆146Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Updated 2 years ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Updated 3 years ago
- A little scanner to check the LDAP Signing state☆46Updated 4 years ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Updated 2 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆88Updated 3 years ago
- Spray a hash via smb to check for local administrator access☆142Updated 4 years ago
- Exchangelib wrapper for pentesting☆67Updated 9 months ago
- Modified version of Pypykatz to print encrypted credentials☆54Updated 2 years ago
- ☆94Updated 3 years ago
- DLL Hijack Search Order Enumeration BOF☆151Updated 4 years ago
- MSBuild without MSbuild.exe☆133Updated 4 years ago
- ☆98Updated 4 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 5 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆64Updated 3 years ago
- ☆142Updated 3 years ago
- ☆59Updated 4 years ago
- .NET project for installing Persistence☆63Updated 3 years ago
- Collection of CobaltStrike beacon object files☆105Updated 3 years ago
- ☆67Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- C# tool to discover low hanging fruits☆96Updated 2 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- ☆95Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- PoC to interact with local/remote registry hives through WMI☆86Updated 5 years ago