astar-security / LestatLinks
Check robustness of your (their) Active Directory accounts passwords
☆44Updated 6 months ago
Alternatives and similar repositories for Lestat
Users that are interested in Lestat are comparing it to the libraries listed below
Sorting:
- Custom queries list for BloodHound☆29Updated 2 months ago
- Discord C2 Profile for Mythic☆32Updated 6 months ago
- ☆12Updated 11 months ago
- Scripts that automate portions of pentests.☆52Updated last month
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆95Updated 2 years ago
- ☆19Updated 2 months ago
- Rewriting SIET to python3☆53Updated 10 months ago
- ☆83Updated last month
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated last year
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Updated last year
- tool for identifying guest relationships between companies☆101Updated last year
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆64Updated 7 months ago
- ☆59Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- ☆16Updated last year
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆93Updated last year
- fully async implementation of Dirkjan's ROADTools☆32Updated 5 months ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆71Updated 5 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆77Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆29Updated 6 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆26Updated last year
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆35Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year