lkarlslund / ldapnomnomLinks
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
☆1,031Updated 8 months ago
Alternatives and similar repositories for ldapnomnom
Users that are interested in ldapnomnom are comparing it to the libraries listed below
Sorting:
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,249Updated 3 months ago
- Dumping DPAPI credz remotely☆1,182Updated 4 months ago
- ☆798Updated this week
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,183Updated 2 months ago
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆854Updated 3 months ago
- SMBeagle - Fileshare auditing tool.☆718Updated 6 months ago
- Powershell tool to automate Active Directory enumeration.☆1,144Updated last month
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,164Updated 4 months ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆821Updated 3 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆803Updated 3 weeks ago
- Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!☆880Updated last year
- Dominate Active Directory with PowerShell.☆1,033Updated last month
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆703Updated this week
- ☆713Updated 6 months ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,051Updated 9 months ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆899Updated 8 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,039Updated last month
- Azure Data Exporter for BloodHound☆738Updated this week
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,219Updated last month
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆725Updated 2 years ago
- Compiled tools for internal assessments☆344Updated last week
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,193Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,165Updated last month
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆708Updated last week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆586Updated 8 months ago
- BlueHound - pinpoint the security issues that actually matter☆742Updated 2 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆494Updated 2 years ago
- In-depth ldap enumeration utility☆493Updated last week
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 4 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,155Updated last week