ProcessusT / HEKATOMBLinks
Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all DPAPI blob of all users from all computers and uses Domain backup keys to decrypt them.
☆515Updated 10 months ago
Alternatives and similar repositories for HEKATOMB
Users that are interested in HEKATOMB are comparing it to the libraries listed below
Sorting:
- Powershell commands for enumeration in Windows Active Directory environment.☆41Updated 2 years ago
- Dominate Active Directory with PowerShell.☆985Updated 2 weeks ago
- A python tool to automate KeePass discovery and secret extraction.☆491Updated 6 months ago
- Docker images of the Exegol project☆106Updated this week
- Assess the security of your Active Directory with few or all privileges.☆320Updated 2 weeks ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆425Updated 3 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆122Updated last week
- PowerShell Ransomware Simulator with C2 Server☆486Updated last year
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆827Updated 2 months ago
- Dumping DPAPI credz remotely☆1,146Updated 3 months ago
- Script for generating revshells☆472Updated 9 months ago
- Identify the accounts most vulnerable to dictionary attacks☆120Updated 2 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆772Updated this week
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆924Updated last month
- Send phishing messages and attachments to Microsoft Teams users☆1,081Updated last year
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,018Updated 11 months ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,158Updated 3 weeks ago
- GLPI vulnerabilities checking tool☆125Updated 3 weeks ago
- Active Directory Auditing and Enumeration☆459Updated last week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆575Updated 7 months ago
- Simple & Powerful PowerShell Script Obfuscator☆568Updated last month
- Lab used for workshop and CTF☆250Updated last month
- Powershell tool to automate Active Directory enumeration.☆1,123Updated 2 weeks ago
- ☆160Updated 8 months ago
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that I find useful during internal penetration tests…☆272Updated 3 weeks ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆466Updated 10 months ago
- Pentest Report Generator☆410Updated 2 weeks ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆373Updated 4 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 5 months ago
- C2 infrastructure over Microsoft Teams.☆689Updated 5 months ago