lkarlslund / ldapnomnomLinks
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
☆1,033Updated 8 months ago
Alternatives and similar repositories for ldapnomnom
Users that are interested in ldapnomnom are comparing it to the libraries listed below
Sorting:
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,238Updated 3 months ago
- ☆774Updated last week
- Dumping DPAPI credz remotely☆1,161Updated 3 months ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,172Updated last month
- SMBeagle - Fileshare auditing tool.☆717Updated 5 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,153Updated 3 months ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆701Updated 2 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,158Updated last week
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆782Updated 3 weeks ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,039Updated 8 months ago
- Dominate Active Directory with PowerShell.☆1,009Updated 2 weeks ago
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆845Updated 3 months ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆886Updated 8 months ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆798Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆766Updated last year
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,184Updated last year
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,203Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆585Updated 7 months ago
- Azure JWT Token Manipulation Toolset☆671Updated 7 months ago
- ☆705Updated 5 months ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆815Updated 3 months ago
- BlueHound - pinpoint the security issues that actually matter☆738Updated 2 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 3 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆494Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆721Updated 2 years ago
- Send phishing messages and attachments to Microsoft Teams users☆1,083Updated last year
- Powershell tool to automate Active Directory enumeration.☆1,134Updated last month
- Redeye is a tool intended to help you manage your data during a pentest operation☆467Updated 10 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆936Updated last week
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,359Updated 4 months ago