jwardsmith / Active-Directory-Exploitation
☆39Updated last year
Alternatives and similar repositories for Active-Directory-Exploitation:
Users that are interested in Active-Directory-Exploitation are comparing it to the libraries listed below
- Azure AD Password Checker☆84Updated 3 weeks ago
- ☆78Updated last year
- Convert Cobalt Strike profiles to IIS web.config files☆112Updated 3 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- ☆92Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆125Updated last year
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆100Updated 2 years ago
- ☆95Updated last year
- ☆55Updated 10 months ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆81Updated last year
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- ☆45Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆68Updated 5 months ago
- Powershell version of SharpGPOAbuse☆74Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆39Updated 3 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Updated 2 years ago
- AV/EDR evasion via direct system calls.☆107Updated last year
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated 2 years ago
- Checks for signature requirements over LDAP☆96Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆106Updated last year
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated last year
- DCSync Attack from Outside using Impacket☆112Updated 2 years ago
- ACL abuse swiss-knife☆119Updated 2 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆175Updated 2 years ago
- A variety of AV evasion techniques written in C# for practice.☆83Updated 3 years ago
- MSSQL Database Attacker tool☆190Updated 2 years ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- ☆27Updated last year