Orange-Cyberdefense / KeePwn
A python tool to automate KeePass discovery and secret extraction.
☆482Updated 4 months ago
Alternatives and similar repositories for KeePwn:
Users that are interested in KeePwn are comparing it to the libraries listed below
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆543Updated 5 months ago
- ☆534Updated last year
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆898Updated 3 weeks ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆466Updated 7 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆351Updated 2 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆708Updated last year
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆415Updated last month
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆411Updated 2 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆368Updated 2 months ago
- Just another Powerview alternative☆615Updated this week
- In-depth ldap enumeration utility☆463Updated last month
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated 2 months ago
- Ask a TGS on behalf of another user without password☆467Updated 2 weeks ago
- Active Directory Auditing and Enumeration☆446Updated last week
- Kraken, a modular multi-language webshell coded by @secu_x11☆538Updated last year
- Docker images of the Exegol project☆104Updated last week
- Kerberoast with ACL abuse capabilities☆432Updated 4 months ago
- DPAPI looting remotely and locally in Python☆452Updated last week
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆129Updated 5 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆489Updated 2 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆632Updated last year
- Script for generating revshells☆464Updated 7 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 3 years ago
- Useful C2 techniques and cheatsheets learned from engagements☆494Updated last week
- Password spraying tool and Bloodhound integration☆231Updated 3 months ago
- Compiled tools for internal assessments☆280Updated this week
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆221Updated this week
- Partial python implementation of SharpGPOAbuse☆412Updated last year
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that I find useful during internal penetration tests…☆265Updated 3 months ago
- CVE-2023-24055 PoC (KeePass 2.5x)☆253Updated 2 years ago