MD-AlHowsa / GoLDAPLinks
An addon to import users from active directory to gophish
☆19Updated 3 years ago
Alternatives and similar repositories for GoLDAP
Users that are interested in GoLDAP are comparing it to the libraries listed below
Sorting:
- PetitPotam fork with Kerberos support in the impacket script☆17Updated 4 years ago
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Updated 3 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆14Updated 4 years ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Updated 5 years ago
- Tool to perform lateral movement between AAD joined devices☆65Updated 3 years ago
- Files to automatically deploy red team Active Directory test lab☆47Updated 3 years ago
- Notification webhook for GoPhish☆57Updated last year
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆60Updated 2 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated last month
- A python based script to update DNS entries in ADIDNS☆43Updated last year
- .NET Project for performing Authenticated Remote Execution☆11Updated 2 years ago
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Updated 4 years ago
- ☆35Updated 3 years ago
- blame Huy☆42Updated 4 years ago
- Password Spraying Framework☆63Updated 3 years ago
- Machine Learning Network Share Password Hunting Toolkit☆128Updated 5 years ago
- RDP Checker☆65Updated last year
- ☆20Updated 2 years ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆48Updated 3 years ago
- ☆17Updated 3 years ago
- AutoPoC Generator HoneyPoC☆35Updated 7 months ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 4 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 8 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- ☆27Updated 4 years ago
- Exploit for HiveNightmare - CVE-2021–36934☆61Updated 3 months ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago