VbScrub / AdSyncDecrypt
☆23Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for AdSyncDecrypt
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆76Updated 10 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- Python3 Ebowla... 3Bowla☆17Updated 4 years ago
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆12Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆47Updated 2 years ago
- ☆30Updated 4 years ago
- Modified version of PEAS client for offensive operations☆38Updated last year
- Convert an LDIF file to JSON files ingestible by BloodHound☆38Updated 2 months ago
- Find Inbound Email Domains☆21Updated 10 months ago
- Exchangelib wrapper for pentesting☆56Updated 5 months ago
- My BloodHound custom queries☆22Updated last year
- Azure pentesting reference for Altered Security Lab☆24Updated 2 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆16Updated 5 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆22Updated last year
- terraform deployment for red team☆21Updated last year
- Password Spraying Script detecting current and previous passwords of Active Directory User☆63Updated 3 years ago
- ☆20Updated 2 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆25Updated 3 months ago
- Active Directory ACL exploitation with BloodHound☆12Updated 3 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆31Updated last year
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆84Updated last year
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- ☆12Updated 2 years ago
- Hiding your infrastructure from the boys in blue.☆20Updated 3 years ago
- ☆35Updated 3 years ago
- Checks for signature requirements over LDAP☆92Updated 2 years ago