cogiceo / AAN
Access All Networks: an offensive multitool against 802.1X
☆16Updated 3 months ago
Alternatives and similar repositories for AAN:
Users that are interested in AAN are comparing it to the libraries listed below
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated 2 months ago
- ☆139Updated 8 months ago
- pysnaffler☆91Updated last month
- Generate graphs and charts based on password cracking result☆159Updated 2 years ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆52Updated 4 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆128Updated last week
- ☆190Updated 6 months ago
- linikatz is a tool to attack AD on UNIX☆145Updated last year
- Make everyone in your VLAN ASRep roastable☆186Updated last month
- Hybrid AD utilities for ROADtools☆72Updated 2 months ago
- Continuous password spraying tool☆180Updated last month
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆129Updated 5 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆105Updated 2 weeks ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆99Updated 5 months ago
- Azure Post Exploitation Framework☆196Updated last month
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆113Updated 3 weeks ago
- Generate and Manage KeyCredentialLinks☆149Updated last week
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆185Updated last month
- Parses Snaffler output file and generate beautified outputs.☆92Updated 2 months ago
- Azure mindmap for penetration tests☆181Updated last year
- C++ Reflective Assembly Loader☆22Updated last month
- Efflanrs - GUI for Snaffler Output☆26Updated 7 months ago
- winPEAS, but for Active Directory☆149Updated 2 weeks ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆166Updated 10 months ago
- Automated exploitation of MSSQL servers at scale☆108Updated last week
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆62Updated 4 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆183Updated last week
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆205Updated last week
- Malware As A Service☆132Updated last year