ProcessusT / HEKATOMBLinks
Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all DPAPI blob of all users from all computers and uses Domain backup keys to decrypt them.
☆526Updated last year
Alternatives and similar repositories for HEKATOMB
Users that are interested in HEKATOMB are comparing it to the libraries listed below
Sorting:
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆439Updated 4 months ago
- Powershell commands for enumeration in Windows Active Directory environment.☆48Updated 3 years ago
- A python tool to automate KeePass discovery and secret extraction.☆513Updated last year
- Send phishing messages and attachments to Microsoft Teams users☆1,099Updated last year
- Active Directory Mindmap Recipes: A Compromise à la Carte☆148Updated 5 months ago
- Dominate Active Directory with PowerShell.☆1,158Updated 2 months ago
- Active Directory Auditing and Enumeration☆515Updated 2 months ago
- Docker images of the Exegol project☆123Updated last week
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆972Updated 3 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,028Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆668Updated 3 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆599Updated last month
- Assess the security of your Active Directory with few or all privileges.☆341Updated this week
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆653Updated 3 weeks ago
- Script for generating revshells☆479Updated last year
- PowerShell Ransomware Simulator with C2 Server☆500Updated last month
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆879Updated last week
- Dumping DPAPI credz remotely☆1,310Updated 10 months ago
- Lab used for workshop and CTF☆487Updated this week
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆386Updated 2 weeks ago
- Pentest Report Generator☆444Updated 3 months ago
- ☆839Updated 3 weeks ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆473Updated last year
- GLPI vulnerabilities checking tool☆157Updated 2 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,005Updated this week
- A RedTeam Toolkit☆409Updated 5 months ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,263Updated last week
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆749Updated 3 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆811Updated 10 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆347Updated last year