Leo4j / Tools
☆13Updated 3 weeks ago
Alternatives and similar repositories for Tools:
Users that are interested in Tools are comparing it to the libraries listed below
- ☆25Updated last year
- ☆43Updated 6 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 8 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Enumerate the Domain for Readable and Writable Shares☆16Updated 7 months ago
- ☆15Updated last year
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆36Updated 4 months ago
- ☆34Updated this week
- Scripts to interact with Microsoft Graph APIs☆33Updated 2 months ago
- .NET wrapper around LogonUserA to test creds☆11Updated 2 years ago
- ☆15Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆18Updated 4 months ago
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Find Inbound Email Domains☆21Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 4 months ago
- Discord C2 Profile for Mythic☆26Updated 9 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆10Updated last month
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆52Updated last month
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆11Updated 9 months ago
- ☆46Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 9 months ago
- ☆70Updated last year