Fast offline auditing of Active Directory passwords using Python.
☆166Aug 14, 2024Updated last year
Alternatives and similar repositories for lil-pwny
Users that are interested in lil-pwny are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ingest openldap data into bloodhound☆80Apr 1, 2021Updated 5 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 3 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆333Dec 8, 2022Updated 3 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 5 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆162Feb 2, 2023Updated 3 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆318Dec 19, 2023Updated 2 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆107Jul 26, 2024Updated last year
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- gather gather gather☆586Mar 15, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆342Apr 28, 2022Updated 4 years ago
- Machine Learning Network Share Password Hunting Toolkit☆129Mar 21, 2020Updated 6 years ago
- Finding exposed secrets and personal data in GitLab☆201Nov 18, 2024Updated last year
- Nuubi Tools (Information-ghatering|Scanner|Recon.)☆87Jun 27, 2020Updated 5 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- Red Team oriented C# Simple HTTP & WebDAV Server with Net-NTLM hashes capture functionality☆287Jun 26, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Overlord - Red Teaming Infrastructure Automation☆632May 28, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- ☆100Feb 16, 2021Updated 5 years ago
- Python3 tool to perform password spraying using RDP☆670Aug 17, 2023Updated 2 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,234Jun 7, 2023Updated 2 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- Windows active user credential phishing tool☆284Mar 10, 2020Updated 6 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- USB testing made easy☆122May 22, 2023Updated 2 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆228Sep 24, 2021Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- retrieve information via O365 and AzureAD with a valid cred☆740Aug 14, 2022Updated 3 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 3 years ago