LuemmelSec / Client-Checker
☆174Updated 2 months ago
Alternatives and similar repositories for Client-Checker:
Users that are interested in Client-Checker are comparing it to the libraries listed below
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆198Updated last month
- ☆140Updated 3 months ago
- A BloodHound collector for Microsoft Configuration Manager☆304Updated 2 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆137Updated 9 months ago
- Some scripts to abuse kerberos using Powershell☆327Updated last year
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆218Updated 7 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆116Updated last year
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆324Updated 3 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆180Updated 6 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆164Updated 5 months ago
- Powershell tools used for Red Team / Pentesting.☆75Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- ☆176Updated 2 months ago
- Automated Active Directory Enumeration☆435Updated last month
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆161Updated 4 months ago
- Azure Post Exploitation Framework☆183Updated this week
- Azure mindmap for penetration tests☆177Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆276Updated 3 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆274Updated 4 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆176Updated 5 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 4 months ago
- LDAP enumeration tool implemented in Python3☆226Updated 5 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆145Updated 2 years ago
- Assess the security of your Active Directory with few or all privileges.☆295Updated 3 weeks ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆198Updated 2 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆142Updated last year
- Everything and anything related to password spraying☆132Updated 9 months ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆99Updated 6 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆165Updated 6 months ago