Sab0tag3d / SIETpy3
Rewriting SIET to python3
☆50Updated 7 months ago
Alternatives and similar repositories for SIETpy3
Users that are interested in SIETpy3 are comparing it to the libraries listed below
Sorting:
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆90Updated last year
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- ☆45Updated 8 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- ☆122Updated last year
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Exchangelib wrapper for pentesting☆64Updated 3 months ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Buggy script to play with GPOs☆97Updated 4 months ago
- Creates and sends fake meeting invite☆59Updated 4 years ago
- ☆55Updated last year
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 3 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Checks for signature requirements over LDAP☆97Updated 2 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆101Updated 2 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- ☆36Updated 4 years ago
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Updated 3 years ago
- ☆21Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- Bypass Constrained Language Mode in PowerShell☆28Updated 5 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆93Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last month
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆35Updated last year
- Creates a malicious ODF document help leak NetNTLM Creds☆31Updated last year