SySS-Research / ldap-swak
LDAP Swiss Army Knife
☆49Updated last year
Alternatives and similar repositories for ldap-swak
Users that are interested in ldap-swak are comparing it to the libraries listed below
Sorting:
- Ingest openldap data into bloodhound☆80Updated 4 years ago
- ☆55Updated last year
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 3 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Service Enumeration C# .NET Assembly☆58Updated 3 years ago
- Python Script for SAML2 Authentication Passwordspray☆39Updated last year
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 6 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 3 years ago
- c# reverse shell poc☆27Updated 6 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆62Updated 4 years ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- ☆21Updated 4 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Updated 3 years ago
- Exchangelib wrapper for pentesting☆64Updated 2 months ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 5 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆58Updated 6 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- A technique for Active Directory domain persistence☆39Updated last year
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- Smart Card PIN swiping DLL☆78Updated 4 years ago
- My BloodHound custom queries☆23Updated 2 years ago
- ☆39Updated 2 years ago