Fast offline auditing of Active Directory passwords using Python.
☆166Aug 14, 2024Updated last year
Alternatives and similar repositories for lil-pwny
Users that are interested in lil-pwny are comparing it to the libraries listed below
Sorting:
- Ingest openldap data into bloodhound☆79Apr 1, 2021Updated 4 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- ☆332Dec 8, 2022Updated 3 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 5 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆317Dec 19, 2023Updated 2 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- gather gather gather☆583Mar 15, 2025Updated last year
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆341Apr 28, 2022Updated 3 years ago
- Machine Learning Network Share Password Hunting Toolkit☆130Mar 21, 2020Updated 5 years ago
- Finding exposed secrets and personal data in GitLab☆200Nov 18, 2024Updated last year
- Nuubi Tools (Information-ghatering|Scanner|Recon.)☆87Jun 27, 2020Updated 5 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- Red Team oriented C# Simple HTTP & WebDAV Server with Net-NTLM hashes capture functionality☆287Jun 26, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Overlord - Red Teaming Infrastructure Automation☆628May 28, 2024Updated last year
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- ☆100Feb 16, 2021Updated 5 years ago
- Python3 tool to perform password spraying using RDP☆669Aug 17, 2023Updated 2 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,227Jun 7, 2023Updated 2 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,127Dec 7, 2022Updated 3 years ago
- Windows active user credential phishing tool☆283Mar 10, 2020Updated 6 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- USB testing made easy☆120May 22, 2023Updated 2 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆228Sep 24, 2021Updated 4 years ago
- ☆299Nov 9, 2020Updated 5 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- retrieve information via O365 and AzureAD with a valid cred☆732Aug 14, 2022Updated 3 years ago
- NTLM relaying for Windows made easy☆581Apr 25, 2023Updated 2 years ago