ShutdownRepo / dcshadowLinks
Python alternative to Mimikatz lsadump::dcshadow
☆144Updated last month
Alternatives and similar repositories for dcshadow
Users that are interested in dcshadow are comparing it to the libraries listed below
Sorting:
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated 2 months ago
- ☆112Updated 2 months ago
- A community-driven collection of BloodHound queries☆104Updated last month
- Generate and Manage KeyCredentialLinks☆159Updated last week
- ☆140Updated 2 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆106Updated 3 weeks ago
- Inject RDPThief into memory with PowerShell.☆65Updated 6 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 6 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆58Updated last month
- Living off the land searches for explorer and sharepoint☆89Updated 3 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 4 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆86Updated 7 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆107Updated this week
- ☆75Updated 3 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆77Updated 8 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆85Updated 4 months ago
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated 10 months ago
- ☆159Updated last year
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆112Updated this week
- Continuous password spraying tool☆191Updated 5 months ago
- Azure Post Exploitation Framework☆203Updated 5 months ago
- ☆89Updated 6 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆161Updated 2 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 9 months ago
- Active Directory Authentication Library☆78Updated 2 weeks ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆95Updated 3 months ago
- Enumerate Domain Users Without Authentication☆253Updated 3 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 7 months ago