Krypteria / Neo4LDAPLinks
Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analysis in Neo4j, offering an alternative approach to tools like BloodHound.
☆73Updated last week
Alternatives and similar repositories for Neo4LDAP
Users that are interested in Neo4LDAP are comparing it to the libraries listed below
Sorting:
- ☆80Updated 10 months ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆74Updated last year
- A Python POC for CRED1 over SOCKS5☆149Updated 7 months ago
- ☆55Updated 3 months ago
- Lateral Movement☆125Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆115Updated 2 months ago
- ☆45Updated last month
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 3 months ago
- OAuth Device Code Phishing Toolkit☆60Updated last month
- Leveraging AWS Lambda Function URLs for C2 Redirection☆35Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- Living off the land searches for explorer and sharepoint☆83Updated last month
- ☆88Updated 2 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 8 months ago
- TokenCert☆97Updated 6 months ago
- Microsoft Graph API post-exploitation toolkit☆94Updated 10 months ago
- ☆50Updated 7 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆27Updated 4 months ago
- ☆133Updated 3 weeks ago
- Enumerate Domain Users Without Authentication☆34Updated last month
- ☆107Updated 3 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆91Updated 3 weeks ago
- Adversary Emulation Framework☆106Updated 10 months ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 2 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆76Updated last year
- Get Fine Grained Password Policy☆70Updated last month
- ☆60Updated 2 weeks ago
- ☆71Updated last year
- ☆110Updated 6 months ago