ProcessusT / HEKATOMBLinks
Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all DPAPI blob of all users from all computers and uses Domain backup keys to decrypt them.
☆522Updated last year
Alternatives and similar repositories for HEKATOMB
Users that are interested in HEKATOMB are comparing it to the libraries listed below
Sorting:
- A python tool to automate KeePass discovery and secret extraction.☆508Updated last year
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆429Updated 2 months ago
- Powershell commands for enumeration in Windows Active Directory environment.☆46Updated 3 years ago
- Active Directory Auditing and Enumeration☆503Updated last week
- Dominate Active Directory with PowerShell.☆1,131Updated 2 weeks ago
- Send phishing messages and attachments to Microsoft Teams users☆1,096Updated last year
- Script for generating revshells☆479Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆656Updated last month
- Docker images of the Exegol project☆120Updated this week
- Pentest Report Generator☆437Updated last month
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆950Updated last month
- ☆828Updated last month
- Assess the security of your Active Directory with few or all privileges.☆337Updated 6 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆849Updated last month
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆575Updated 7 months ago
- PowerShell Ransomware Simulator with C2 Server☆493Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆386Updated 2 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆143Updated 3 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆808Updated 8 months ago
- Lab used for workshop and CTF☆382Updated last week
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆983Updated last month
- Dumping DPAPI credz remotely☆1,285Updated 8 months ago
- GLPI vulnerabilities checking tool☆152Updated last week
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆987Updated 7 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆347Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 4 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆373Updated 2 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆391Updated 6 months ago
- C2 infrastructure over Microsoft Teams.☆728Updated 10 months ago
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆625Updated last month