Collection of username lists for enumerating kerberos domain users
☆107Dec 18, 2017Updated 8 years ago
Alternatives and similar repositories for kerberos_enum_userlists
Users that are interested in kerberos_enum_userlists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compiled Binaries for Ghostpack☆1,666Oct 24, 2024Updated last year
- Precompiled executable☆67Feb 21, 2025Updated last year
- Handy Stored Password Decryption Techniques☆164Jun 9, 2021Updated 4 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆26Jan 24, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A tool to perform Kerberos pre-auth bruteforcing☆3,312Aug 20, 2024Updated last year
- An script to perform kerberos bruteforcing by using impacket☆460Apr 6, 2022Updated 4 years ago
- Powershell function to pull the local admin passwords from LDAP, stored there by LAPS.☆122Dec 11, 2019Updated 6 years ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,584Mar 11, 2026Updated last month
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆2,047Jul 11, 2024Updated last year
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,763Dec 18, 2021Updated 4 years ago
- My course work about basic binary exploitation.🤿☆12Mar 16, 2022Updated 4 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,211Jan 20, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Build Alpine Linux images for LXD☆204Jul 10, 2025Updated 9 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,229Apr 24, 2026Updated last week
- Port Swigger Labs divided on the based of level and topic.☆14Mar 15, 2022Updated 4 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Apr 2, 2026Updated last month
- Wordlists for creating statistically likely username lists for use in password attacks and security testing. Used for pentesting for over…☆1,313Feb 16, 2026Updated 2 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,390Sep 22, 2025Updated 7 months ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆147Oct 27, 2019Updated 6 years ago
- scripts to setup environments for red/blue teams.☆16Nov 30, 2023Updated 2 years ago
- Command line client for HackTheBox☆25Feb 26, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,170Updated this week
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,321Dec 15, 2020Updated 5 years ago
- ☆13Mar 24, 2026Updated last month
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆15Feb 25, 2021Updated 5 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,100Apr 19, 2023Updated 3 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆444Jul 29, 2013Updated 12 years ago
- ☆37Nov 4, 2017Updated 8 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆166Apr 17, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆267Mar 2, 2026Updated 2 months ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- c# reverse shell poc☆26Dec 22, 2025Updated 4 months ago
- Abusing impersonation privileges through the "Printer Bug"☆2,233Sep 10, 2020Updated 5 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆896Jan 3, 2025Updated last year
- Active Directory information dumper via LDAP☆1,399Apr 6, 2025Updated last year