ProcessusT / HEKATOMBLinks
Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all DPAPI blob of all users from all computers and uses Domain backup keys to decrypt them.
☆518Updated last year
Alternatives and similar repositories for HEKATOMB
Users that are interested in HEKATOMB are comparing it to the libraries listed below
Sorting:
- A python tool to automate KeePass discovery and secret extraction.☆500Updated 8 months ago
- Powershell commands for enumeration in Windows Active Directory environment.☆42Updated 2 years ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆427Updated 5 months ago
- Send phishing messages and attachments to Microsoft Teams users☆1,087Updated last year
- Docker images of the Exegol project☆112Updated 3 weeks ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆136Updated 2 months ago
- Dominate Active Directory with PowerShell.☆1,046Updated 2 months ago
- PowerShell Ransomware Simulator with C2 Server☆485Updated last year
- Script for generating revshells☆476Updated 11 months ago
- Active Directory Auditing and Enumeration☆473Updated last month
- Pentest Report Generator☆425Updated last week
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆870Updated 4 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆376Updated last week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆594Updated 9 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆798Updated 4 months ago
- ☆801Updated 3 weeks ago
- Dumping DPAPI credz remotely☆1,193Updated 5 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆816Updated 3 weeks ago
- Assess the security of your Active Directory with few or all privileges.☆327Updated 2 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 4 years ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆947Updated 2 weeks ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,047Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆728Updated 2 years ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆401Updated 7 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆538Updated 3 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆335Updated 10 months ago
- Active Directory pentesting mind map☆449Updated 2 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆365Updated 6 months ago
- The Havoc Framework☆59Updated 2 years ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,205Updated 3 weeks ago