HarmJ0y / TrustVisualizerLinks
Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.
☆98Updated last year
Alternatives and similar repositories for TrustVisualizer
Users that are interested in TrustVisualizer are comparing it to the libraries listed below
Sorting:
- ☆77Updated 3 months ago
- Check if MS-RPRN is remotely available with powershell/c#☆173Updated 6 years ago
- Python based BloodHound data importer☆147Updated 2 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆154Updated 6 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆124Updated 4 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆156Updated 6 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆142Updated 4 years ago
- ☆127Updated 5 years ago
- CSHARP DCOM Fun☆134Updated 6 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆166Updated 5 years ago
- Tool that automates Active Directory enumeration☆88Updated 4 years ago
- Powershell function to pull the local admin passwords from LDAP, stored there by LAPS.☆120Updated 5 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 4 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Updated 6 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆147Updated 5 years ago
- ☆97Updated 3 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Updated 4 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Updated 3 years ago
- A C# penetration testing tool to discover low-haning web fruit via web requests.☆91Updated 3 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆86Updated 2 years ago
- lateral movement techniques that can be used during red team exercises☆272Updated 5 years ago
- An Insider Threat Toolkit☆153Updated 6 years ago
- ☆46Updated 4 years ago
- BH Cypher Queries picked up from random places☆39Updated 6 years ago
- Code Exec via Excel☆87Updated 8 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆196Updated 6 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- ☆139Updated 5 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆168Updated 3 years ago
- ☆166Updated 2 years ago