PShlyundin / CoverageLinks
A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking results.
☆24Updated 3 months ago
Alternatives and similar repositories for Coverage
Users that are interested in Coverage are comparing it to the libraries listed below
Sorting:
- ☆91Updated 7 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Updated 11 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆107Updated last month
- Impacket is a collection of Python classes for working with network protocols.☆18Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆139Updated 4 months ago
- ☆145Updated 3 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆72Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆39Updated 8 months ago
- A Python POC for CRED1 over SOCKS5☆154Updated 10 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 7 months ago
- Most Responder's configuration power in your hand.☆51Updated 7 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆32Updated 7 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Enumerate domain machine accounts and perform pre2k password spraying.☆70Updated 2 years ago
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆26Updated 6 months ago
- Enumerate Domain Users Without Authentication☆258Updated 4 months ago
- Tool for MSSQL relay audit and abuse☆55Updated 8 months ago
- ☆160Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆111Updated 3 years ago
- Fast context enumeration for newly obtained Active Directory credentials.☆43Updated last week
- Inject RDPThief into memory with PowerShell.☆65Updated 7 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆87Updated 8 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆208Updated last week
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆47Updated 4 months ago
- Lateral Movement☆124Updated last year
- PowerShell Reverse Shell☆78Updated 2 years ago
- Pre-Auth Exploit for CVE-2024-40711☆54Updated 11 months ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- ☆42Updated 6 months ago