Collection of username lists for enumerating kerberos domain users
☆107Dec 18, 2017Updated 8 years ago
Alternatives and similar repositories for kerberos_enum_userlists
Users that are interested in kerberos_enum_userlists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compiled Binaries for Ghostpack☆1,635Oct 24, 2024Updated last year
- Precompiled executable☆66Feb 21, 2025Updated last year
- Handy Stored Password Decryption Techniques☆165Jun 9, 2021Updated 4 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆26Jan 24, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool to perform Kerberos pre-auth bruteforcing☆3,296Aug 20, 2024Updated last year
- An script to perform kerberos bruteforcing by using impacket☆460Apr 6, 2022Updated 4 years ago
- Powershell function to pull the local admin passwords from LDAP, stored there by LAPS.☆122Dec 11, 2019Updated 6 years ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,564Mar 11, 2026Updated last month
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆2,042Jul 11, 2024Updated last year
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,756Dec 18, 2021Updated 4 years ago
- My course work about basic binary exploitation.🤿☆10Mar 16, 2022Updated 4 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,205Jan 20, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Build Alpine Linux images for LXD☆204Jul 10, 2025Updated 9 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,220Jan 5, 2026Updated 3 months ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Apr 2, 2026Updated last week
- Wordlists for creating statistically likely username lists for use in password attacks and security testing. Used for pentesting for over…☆1,295Feb 16, 2026Updated last month
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,376Sep 22, 2025Updated 6 months ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆145Oct 27, 2019Updated 6 years ago
- scripts to setup environments for red/blue teams.☆16Nov 30, 2023Updated 2 years ago
- Command line client for HackTheBox☆25Feb 26, 2024Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,150Updated this week
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Oct 22, 2020Updated 5 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,319Dec 15, 2020Updated 5 years ago
- ☆13Mar 24, 2026Updated 2 weeks ago
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆15Feb 25, 2021Updated 5 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,097Apr 19, 2023Updated 2 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆438Jul 29, 2013Updated 12 years ago
- ☆36Nov 4, 2017Updated 8 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆165Apr 17, 2025Updated 11 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆264Mar 2, 2026Updated last month
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- c# reverse shell poc☆26Dec 22, 2025Updated 3 months ago
- Abusing impersonation privileges through the "Printer Bug"☆2,215Sep 10, 2020Updated 5 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆891Jan 3, 2025Updated last year
- Active Directory information dumper via LDAP☆1,392Apr 6, 2025Updated last year