lkarlslund / ldapnomnomLinks
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
☆1,038Updated 10 months ago
Alternatives and similar repositories for ldapnomnom
Users that are interested in ldapnomnom are comparing it to the libraries listed below
Sorting:
- ☆806Updated 2 months ago
- Dumping DPAPI credz remotely☆1,226Updated 6 months ago
- SMBeagle - Fileshare auditing tool.☆725Updated last month
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,305Updated 5 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,207Updated 6 months ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,226Updated 2 months ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,073Updated 11 months ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆844Updated 5 months ago
- Dominate Active Directory with PowerShell.☆1,053Updated 3 months ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆717Updated 2 months ago
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆895Updated last month
- ☆733Updated 8 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆828Updated last month
- Username enumeration and password spraying tool aimed at Microsoft O365.☆927Updated 10 months ago
- Sandman is a NTP based backdoor for hardened networks.☆808Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,184Updated 3 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆609Updated 10 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆817Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,082Updated 3 weeks ago
- Powershell tool to automate Active Directory enumeration.☆1,179Updated 3 weeks ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,238Updated 3 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,240Updated last week
- a tool to help operate in EDRs' blind spots☆761Updated 10 months ago
- Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!☆884Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆729Updated 2 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,926Updated this week
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆492Updated 2 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆553Updated 4 years ago
- Azure JWT Token Manipulation Toolset☆686Updated 9 months ago
- An offensive data enrichment pipeline☆850Updated this week