ProcessusT / HEKATOMB
Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all DPAPI blob of all users from all computers and uses Domain backup keys to decrypt them.
☆510Updated 9 months ago
Alternatives and similar repositories for HEKATOMB:
Users that are interested in HEKATOMB are comparing it to the libraries listed below
- Dominate Active Directory with PowerShell. Inspired by CrackMapExec / NetExec.☆954Updated this week
- Powershell commands for enumeration in Windows Active Directory environment.☆41Updated 2 years ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆110Updated last month
- Docker images of the Exegol project☆106Updated this week
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆416Updated last month
- Assess the security of your Active Directory with few or all privileges.☆316Updated 3 weeks ago
- Dumping DPAPI credz remotely☆1,114Updated last month
- PowerShell Ransomware Simulator with C2 Server☆483Updated last year
- Simple & Powerful PowerShell Script Obfuscator☆558Updated 2 years ago
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆792Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆547Updated 5 months ago
- A python tool to automate KeePass discovery and secret extraction.☆486Updated 4 months ago
- Identify the accounts most vulnerable to dictionary attacks☆119Updated last month
- Active Directory Auditing and Enumeration☆450Updated last week
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆905Updated last month
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆754Updated last month
- Script for generating revshells☆469Updated 7 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 3 years ago
- ☆707Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆711Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆465Updated 8 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆746Updated last month
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆367Updated 3 months ago
- This project is aimed at freely providing technical guides on various hacking topics.☆851Updated 2 weeks ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆994Updated 9 months ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,015Updated 6 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆512Updated 9 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,958Updated last month
- Hardening Active Directory version 2☆317Updated last month
- Pentest Report Generator☆407Updated last week