ProcessusT / HEKATOMBLinks
Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all DPAPI blob of all users from all computers and uses Domain backup keys to decrypt them.
☆523Updated last year
Alternatives and similar repositories for HEKATOMB
Users that are interested in HEKATOMB are comparing it to the libraries listed below
Sorting:
- Powershell commands for enumeration in Windows Active Directory environment.☆46Updated 3 years ago
- A python tool to automate KeePass discovery and secret extraction.☆509Updated last year
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆437Updated 3 months ago
- Dominate Active Directory with PowerShell.☆1,138Updated last month
- Send phishing messages and attachments to Microsoft Teams users☆1,100Updated last year
- Active Directory Auditing and Enumeration☆513Updated last month
- Docker images of the Exegol project☆123Updated this week
- The Havoc Framework☆63Updated 3 years ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆386Updated 3 months ago
- Dumping DPAPI credz remotely☆1,286Updated 9 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆143Updated 4 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆663Updated 2 months ago
- Script for generating revshells☆477Updated last year
- PowerShell Ransomware Simulator with C2 Server☆496Updated this week
- ☆832Updated 2 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆588Updated 3 weeks ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆582Updated last year
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆954Updated 2 months ago
- Pentest Report Generator☆440Updated 2 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆553Updated 4 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆348Updated last year
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆987Updated 2 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆747Updated 2 months ago
- Assess the security of your Active Directory with few or all privileges.☆336Updated last week
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆864Updated this week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆809Updated 9 months ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,046Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆737Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆842Updated last year
- In-depth ldap enumeration utility☆546Updated last month