Macmod / godap
A complete terminal user interface (TUI) for LDAP.
☆489Updated last month
Alternatives and similar repositories for godap:
Users that are interested in godap are comparing it to the libraries listed below
- An ADCS honeypot to catch attackers in your internal network.☆248Updated 6 months ago
- In-depth ldap enumeration utility☆440Updated last week
- ↕️🤫 Stealth redirector for your red team operation security☆649Updated 5 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆541Updated 6 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆835Updated this week
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆504Updated 10 months ago
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆401Updated last month
- ☆224Updated last month
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆532Updated last year
- Tool to remotely dump secrets from the Windows registry☆415Updated last month
- Kubernetes exploitation tool☆361Updated 5 months ago
- Tools for interacting with authentication packages using their individual message protocols☆303Updated 2 weeks ago
- Golang weaponization for red teamers.☆482Updated last year
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆588Updated 6 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆273Updated last month
- Multiplayer pivoting solution☆129Updated last week
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆704Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆703Updated 11 months ago
- nysm is a stealth post-exploitation container.☆241Updated last year
- DPAPI looting remotely and locally in Python☆434Updated this week
- Assess the security of your Active Directory with few or all privileges.☆254Updated last week
- ☆520Updated 9 months ago
- ☆281Updated last year
- Dump NTDS with golden certificates and UnPAC the hash☆629Updated 10 months ago
- Compiled tools for internal assessments☆260Updated this week
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆348Updated 9 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆420Updated 2 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆485Updated last year
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆466Updated 5 months ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆402Updated last year