Mazars-Tech / AD_Miner
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
☆1,197Updated last month
Alternatives and similar repositories for AD_Miner:
Users that are interested in AD_Miner are comparing it to the libraries listed below
- A PowerShell tool that takes strong inspiration from CrackMapExec / NetExec☆914Updated 4 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆702Updated 11 months ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆767Updated 2 weeks ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,006Updated 2 months ago
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆733Updated last month
- Dumping DPAPI credz remotely☆1,044Updated 2 months ago
- C# Data Collector for BloodHound☆809Updated last week
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,086Updated 7 months ago
- Six Degrees of Domain Admin☆1,280Updated this week
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,404Updated 3 months ago
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,067Updated this week
- Powershell tool to automate Active Directory enumeration.☆1,033Updated 2 weeks ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,858Updated this week
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,052Updated 6 months ago
- Windows Local Privilege Escalation Cookbook☆1,024Updated last month
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,860Updated last month
- Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive an…☆846Updated this week
- Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)☆1,805Updated last week
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆604Updated 7 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆596Updated this week
- Azure Data Exporter for BloodHound☆599Updated this week
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆1,975Updated last week
- Active Directory certificate abuse.☆1,565Updated 5 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,040Updated this week
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,018Updated 2 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆834Updated this week
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆704Updated last year
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆542Updated 3 months ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,307Updated 3 weeks ago