Tylous / TalonLinks
A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.
☆44Updated last year
Alternatives and similar repositories for Talon
Users that are interested in Talon are comparing it to the libraries listed below
Sorting:
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆95Updated 2 years ago
- ☆69Updated 7 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆42Updated last month
- Fast context enumeration for newly obtained Active Directory credentials.☆62Updated this week
- ☆119Updated 5 months ago
- pysnaffler☆102Updated last week
- ☆186Updated this week
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆156Updated 10 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- ☆160Updated last year
- Efflanrs - GUI for Snaffler Output☆27Updated 11 months ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆170Updated 2 weeks ago
- Automated exploitation of MSSQL servers at scale☆115Updated last week
- ☆80Updated last month
- Custom queries list for BloodHound☆29Updated last month
- Living off the land searches for explorer and sharepoint☆90Updated 4 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆32Updated 7 months ago
- Cortex XDR Config Extractor☆133Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆36Updated 2 years ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆109Updated last month
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Updated 11 months ago
- ☆68Updated 3 weeks ago
- Most Responder's configuration power in your hand.☆51Updated 7 months ago
- ☆91Updated 7 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆86Updated last month
- Some scripts to support with importing large datasets into BloodHound☆81Updated last year
- ☆72Updated 2 months ago