A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.
☆58Jul 2, 2025Updated 8 months ago
Alternatives and similar repositories for LDAPWordlistHarvester
Users that are interested in LDAPWordlistHarvester are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- ☆142Sep 9, 2025Updated 6 months ago
- ☆48Dec 5, 2025Updated 3 months ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆42Feb 6, 2026Updated last month
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆75Feb 27, 2026Updated 3 weeks ago
- A stager and implant that executes remote Web Assembly☆60Feb 4, 2026Updated last month
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆211Sep 30, 2024Updated last year
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 8 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆148Jul 17, 2025Updated 8 months ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆278Feb 5, 2026Updated last month
- ☆60Jun 2, 2025Updated 9 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆167Nov 2, 2025Updated 4 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆119Jan 25, 2026Updated last month
- List web account manager (WAM) accounts added to the current profile☆24Dec 11, 2025Updated 3 months ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆18Updated this week
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆175May 13, 2024Updated last year
- A small How-To on creating your own weaponized WSL file☆124Jul 23, 2025Updated 8 months ago
- GolenGMSA tool for working with GMSA passwords☆172Aug 21, 2025Updated 7 months ago
- Automating the MITM attack on WSUS☆315Updated this week
- Living off the land searches for explorer and sharepoint☆93Dec 7, 2025Updated 3 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆215Jan 12, 2026Updated 2 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆161Jun 24, 2025Updated 8 months ago
- ADCS cert template modification and ACL enumeration☆143Jun 26, 2023Updated 2 years ago
- Lateral movement with DCOM DLL hijacking☆176Jul 4, 2025Updated 8 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 6 months ago
- ☆37Dec 4, 2025Updated 3 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 7 months ago
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆230Nov 6, 2025Updated 4 months ago
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆43Mar 13, 2025Updated last year
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆657Jan 16, 2026Updated 2 months ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆67Jun 10, 2025Updated 9 months ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Extract the windows major and minor build numbers from an ISO file, and automatically sort the iso files.☆17Oct 8, 2024Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- ☆287Aug 14, 2025Updated 7 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 5 months ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year