klezVirus / vortex
VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit
☆430Updated last year
Alternatives and similar repositories for vortex:
Users that are interested in vortex are comparing it to the libraries listed below
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆297Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆456Updated 2 years ago
- ☆404Updated last year
- Maximizing BloodHound. Max is a good boy.☆504Updated 3 weeks ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆377Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆319Updated 3 months ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆474Updated last year
- Password spraying and bruteforcing tool for Active Directory Domain Services☆358Updated 3 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆388Updated last month
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆384Updated 10 months ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆438Updated last year
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆417Updated 2 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆632Updated 11 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆553Updated 3 years ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆436Updated last year
- ☆506Updated 3 years ago
- Windows for Red Teamers☆127Updated 2 years ago
- An Office365 User Attack Tool☆628Updated 11 months ago
- Kerberoast with ACL abuse capabilities☆406Updated 2 months ago
- Password spraying tool and Bloodhound integration☆220Updated last month
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆471Updated 7 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆486Updated 2 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆271Updated 3 years ago
- Python3 terminal application that contains 405 Neo4j cyphers for BloodHound data sets and 388 GUI cyphers☆375Updated 4 months ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆279Updated 2 years ago
- Useful C2 techniques and cheatsheets learned from engagements☆462Updated 4 months ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆255Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆742Updated last year
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆290Updated 3 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆514Updated 3 months ago