ProcessusT / HEKATOMBLinks
Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all DPAPI blob of all users from all computers and uses Domain backup keys to decrypt them.
☆522Updated last year
Alternatives and similar repositories for HEKATOMB
Users that are interested in HEKATOMB are comparing it to the libraries listed below
Sorting:
- A python tool to automate KeePass discovery and secret extraction.☆508Updated last year
- Powershell commands for enumeration in Windows Active Directory environment.☆46Updated 3 years ago
- Dominate Active Directory with PowerShell.☆1,133Updated 2 weeks ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆429Updated 2 months ago
- Active Directory Auditing and Enumeration☆508Updated 2 weeks ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆143Updated 3 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆656Updated last month
- Send phishing messages and attachments to Microsoft Teams users☆1,098Updated last year
- Docker images of the Exegol project☆120Updated this week
- Dumping DPAPI credz remotely☆1,285Updated 8 months ago
- Script for generating revshells☆478Updated last year
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆983Updated last month
- PowerShell Ransomware Simulator with C2 Server☆494Updated last year
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆952Updated 2 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆386Updated 2 months ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,252Updated 2 weeks ago
- Pentest Report Generator☆438Updated last month
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆347Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆577Updated last week
- ☆830Updated last month
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 4 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆744Updated last month
- Redeye is a tool intended to help you manage your data during a pentest operation☆472Updated last year
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,119Updated last year
- GLPI vulnerabilities checking tool☆154Updated 2 weeks ago
- In-depth ldap enumeration utility☆543Updated 3 weeks ago
- Assess the security of your Active Directory with few or all privileges.☆337Updated 6 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆736Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆854Updated last month
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆809Updated 8 months ago