asmtlab / ADHunt
Tool for enumerating Active Directory environments
☆46Updated last year
Alternatives and similar repositories for ADHunt:
Users that are interested in ADHunt are comparing it to the libraries listed below
- My Favorite Offensive Security Scripts☆66Updated last year
- ☆51Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆97Updated last year
- linikatz is a tool to attack AD on UNIX☆142Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆57Updated 2 weeks ago
- C2 Automation using Linode☆80Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated 6 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Tool to extract username and password of current user from PanGPA in plaintext☆82Updated last month
- PowerShell Reverse Shell☆61Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆106Updated 3 weeks ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆82Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆76Updated 2 weeks ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆85Updated last month
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆114Updated last year
- Abuse Azure API permissions for red teaming☆61Updated 2 years ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆74Updated 2 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆109Updated 3 months ago
- ☆147Updated 11 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆32Updated 8 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated 3 months ago
- Source code and examples for PassiveAggression☆55Updated 8 months ago
- Inject RDPThief into memory with PowerShell.☆60Updated last month
- ☆58Updated 4 months ago
- 🌩️ Collection of BloodHound queries for Azure☆57Updated last month
- InfoSec Notes☆56Updated 10 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆103Updated 3 weeks ago