ProcessusT / HEKATOMBLinks
Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all DPAPI blob of all users from all computers and uses Domain backup keys to decrypt them.
☆518Updated last year
Alternatives and similar repositories for HEKATOMB
Users that are interested in HEKATOMB are comparing it to the libraries listed below
Sorting:
- Powershell commands for enumeration in Windows Active Directory environment.☆42Updated 2 years ago
- A python tool to automate KeePass discovery and secret extraction.☆495Updated 7 months ago
- Send phishing messages and attachments to Microsoft Teams users☆1,085Updated last year
- Dominate Active Directory with PowerShell.☆1,033Updated last month
- Docker images of the Exegol project☆111Updated this week
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆423Updated 4 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆135Updated last month
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,043Updated last year
- Active Directory Auditing and Enumeration☆470Updated last month
- PowerShell Ransomware Simulator with C2 Server☆487Updated last year
- Script for generating revshells☆476Updated 10 months ago
- Pentest Report Generator☆417Updated last week
- Dumping DPAPI credz remotely☆1,182Updated 4 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆793Updated 4 months ago
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆854Updated 4 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆588Updated 8 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆375Updated 6 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆803Updated 3 weeks ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆526Updated 3 months ago
- ☆798Updated last week
- Assess the security of your Active Directory with few or all privileges.☆323Updated 2 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆940Updated last month
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,193Updated this week
- Redeye is a tool intended to help you manage your data during a pentest operation☆468Updated 11 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 4 years ago
- Simple & Powerful PowerShell Script Obfuscator☆572Updated 2 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆727Updated 2 years ago
- Automate your C2 creation with Azure Frontdoor and randomly generated options☆16Updated 10 months ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,031Updated 8 months ago
- A RedTeam Toolkit☆404Updated 4 months ago