ProcessusT / HEKATOMBLinks
Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all DPAPI blob of all users from all computers and uses Domain backup keys to decrypt them.
☆523Updated last year
Alternatives and similar repositories for HEKATOMB
Users that are interested in HEKATOMB are comparing it to the libraries listed below
Sorting:
- A python tool to automate KeePass discovery and secret extraction.☆507Updated 11 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆432Updated last month
- Send phishing messages and attachments to Microsoft Teams users☆1,095Updated last year
- Powershell commands for enumeration in Windows Active Directory environment.☆44Updated 3 years ago
- Dominate Active Directory with PowerShell.☆1,112Updated last week
- Active Directory Mindmap Recipes: A Compromise à la Carte☆139Updated 2 months ago
- Docker images of the Exegol project☆120Updated 3 weeks ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆570Updated 6 months ago
- Script for generating revshells☆478Updated last year
- Active Directory Auditing and Enumeration☆495Updated 2 weeks ago
- Dumping DPAPI credz remotely☆1,272Updated 7 months ago
- Pentest Report Generator☆433Updated 3 weeks ago
- PowerShell Ransomware Simulator with C2 Server☆493Updated last year
- Assess the security of your Active Directory with few or all privileges.☆338Updated 5 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆980Updated 2 weeks ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆383Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆643Updated 3 weeks ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆807Updated 7 months ago
- Lab used for workshop and CTF☆345Updated last week
- The Havoc Framework☆60Updated 3 years ago
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆925Updated last month
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆553Updated 4 years ago
- ☆811Updated 2 weeks ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆469Updated last year
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆564Updated last year
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,246Updated 3 months ago
- GLPI vulnerabilities checking tool☆148Updated last month
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆741Updated 3 weeks ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆733Updated 2 years ago
- C2 infrastructure over Microsoft Teams.☆731Updated 10 months ago