astar-security / LestatLinks
Check robustness of your (their) Active Directory accounts passwords
☆35Updated 4 months ago
Alternatives and similar repositories for Lestat
Users that are interested in Lestat are comparing it to the libraries listed below
Sorting:
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆43Updated 4 years ago
- Discord C2 Profile for Mythic☆31Updated 5 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 10 months ago
- Scripts that automate portions of pentests.☆52Updated 3 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- fully async implementation of Dirkjan's ROADTools☆32Updated 4 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- ☆15Updated last year
- Check the Domain for Local Admin Access☆16Updated 5 months ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Custom queries list for BloodHound☆29Updated 3 weeks ago
- ☆47Updated 3 years ago
- ☆73Updated last week
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 5 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated last year
- Rewriting SIET to python3☆51Updated 9 months ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Updated last year
- ☆16Updated 3 weeks ago
- self-hosted Azure OSINT tool☆31Updated last month
- Next generation fireprox AWS API endpoint creation utility.☆53Updated 2 years ago
- tool for identifying guest relationships between companies☆101Updated last year
- Convert ldapdomaindump to Bloodhound☆81Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆63Updated 2 months ago
- ☆52Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 6 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago