astar-security / LestatLinks
Check robustness of your (their) Active Directory accounts passwords
☆35Updated 3 months ago
Alternatives and similar repositories for Lestat
Users that are interested in Lestat are comparing it to the libraries listed below
Sorting:
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 9 months ago
- ☆52Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆25Updated 3 months ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- self-hosted Azure OSINT tool☆30Updated 9 months ago
- ☆28Updated 2 years ago
- Discord C2 Profile for Mythic☆29Updated 4 months ago
- Tool written in Rust to perform Password Spraying attacks against Azure/Office 365 accounts☆17Updated last year
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆14Updated 5 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- fully async implementation of Dirkjan's ROADTools☆32Updated 3 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 3 months ago
- Scripts that automate portions of pentests.☆51Updated last month
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆46Updated last year
- ☆12Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 3 months ago
- ☆31Updated 3 weeks ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Custom queries list for BloodHound☆28Updated 9 months ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Updated 4 months ago
- ☆15Updated last month
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- ☆70Updated 3 weeks ago