AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos.
☆308Jul 4, 2023Updated 2 years ago
Alternatives and similar repositories for ADenum
Users that are interested in ADenum are comparing it to the libraries listed below
Sorting:
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Feb 19, 2026Updated last week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,155Feb 21, 2026Updated last week
- ☆540Nov 20, 2021Updated 4 years ago
- Lookup for interesting stuff in SMB shares☆150Jun 16, 2023Updated 2 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆278Jan 14, 2023Updated 3 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,053Jan 22, 2026Updated last month
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- Framework for Kerberos relaying☆937May 29, 2022Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,041Jul 10, 2022Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆232Jun 10, 2022Updated 3 years ago
- Dumping DPAPI credz remotely☆1,328Mar 24, 2025Updated 11 months ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆863Mar 20, 2023Updated 2 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆931Nov 11, 2024Updated last year
- Dumping LSASS with a duplicated handle from custom LSA plugin☆204Feb 23, 2022Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,397Dec 16, 2021Updated 4 years ago
- Retrieve LAPS password from LDAP☆436Feb 17, 2021Updated 5 years ago
- Kerberoast attack -pure python-☆433Nov 30, 2023Updated 2 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,439Dec 18, 2022Updated 3 years ago
- ☆1,669Apr 14, 2025Updated 10 months ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,092Jan 31, 2026Updated last month
- Spray a hash via smb to check for local administrator access☆142Feb 7, 2021Updated 5 years ago
- Password Hunter in Active Directory☆198Jan 6, 2023Updated 3 years ago
- Active Directory certificate abuse.☆1,915Oct 27, 2025Updated 4 months ago
- ☆829Sep 9, 2022Updated 3 years ago
- ☆360Apr 24, 2021Updated 4 years ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆484Sep 24, 2025Updated 5 months ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,179Aug 15, 2024Updated last year
- Run Powershell without software restrictions.☆281Sep 8, 2021Updated 4 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆440Jan 4, 2025Updated last year
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆483Jul 9, 2024Updated last year
- Powershell tool to automate Active Directory enumeration.☆1,284Sep 9, 2025Updated 5 months ago
- RDP Checker☆64Feb 23, 2024Updated 2 years ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.☆151Nov 21, 2021Updated 4 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆426Apr 22, 2021Updated 4 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆614Aug 15, 2025Updated 6 months ago
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The …☆386Nov 13, 2023Updated 2 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆185Jan 9, 2022Updated 4 years ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,737Feb 2, 2026Updated 3 weeks ago