icyguider / NewPowerDNS
Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.
☆83Updated last year
Alternatives and similar repositories for NewPowerDNS:
Users that are interested in NewPowerDNS are comparing it to the libraries listed below
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 5 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Automated exploitation of MSSQL servers at scale☆106Updated 2 months ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Get Fine Grained Password Policy☆68Updated 10 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- ☆43Updated 8 months ago
- ☆26Updated last year
- ☆116Updated last year
- Abuse Azure API permissions for red teaming☆61Updated 2 years ago
- PoC-Malware-TTPs☆49Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆55Updated 3 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆54Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆137Updated 8 months ago
- ☆52Updated last year
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated last year
- ☆45Updated last week
- ☆51Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 6 months ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆84Updated last year
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆64Updated last month
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago