almandin / ntdsdotsqlite
A small utility to translate NTDS.dit files to SQLite format.
☆72Updated last year
Alternatives and similar repositories for ntdsdotsqlite:
Users that are interested in ntdsdotsqlite are comparing it to the libraries listed below
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆138Updated 8 months ago
- Automated exploitation of MSSQL servers at scale☆107Updated this week
- ☆117Updated last week
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆170Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆145Updated last year
- Cortex XDR Config Extractor☆131Updated 2 years ago
- ☆158Updated 4 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆173Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆203Updated 3 months ago
- ☆53Updated 2 months ago
- ☆139Updated 7 months ago
- Parses Snaffler output file and generate beautified outputs.☆88Updated 2 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated last year
- A Python POC for CRED1 over SOCKS5☆144Updated 6 months ago
- pysnaffler☆91Updated 3 weeks ago
- PowerShell Reverse Shell☆61Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆111Updated 2 months ago
- ☆197Updated last year
- Just some random Red Team Scripts that can be useful☆150Updated 9 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆146Updated 10 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 6 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆111Updated last week
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- Lateral Movement☆122Updated last year
- AAD related enumeration in Nim☆129Updated last year
- ☆155Updated last year
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆150Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆121Updated 3 years ago