m8sec / ActiveReignLinks
A Network Enumeration and Attack Toolset for Windows Active Directory Environments.
☆248Updated last year
Alternatives and similar repositories for ActiveReign
Users that are interested in ActiveReign are comparing it to the libraries listed below
Sorting:
- locate and attack Lync/Skype for Business☆346Updated last year
- For all your network pentesting needs☆154Updated last year
- A framework for stealthy domain reconnaissance☆303Updated 4 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆205Updated 5 years ago
- Domain user enumeration tool☆214Updated 2 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Updated 4 years ago
- Rapid Attack Infrastructure (RAI)☆309Updated last year
- Microsoft External Attack Tool☆178Updated 3 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆204Updated last year
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400Updated 5 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆114Updated 5 years ago
- An LDAP based Active Directory user and group enumeration tool☆306Updated 2 years ago
- Various Cheat Sheets☆183Updated 4 years ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆251Updated last year
- Weaponizing Splunk with reverse and bind shells.☆182Updated 8 years ago
- This is a weaponized WSUS exploit☆297Updated 3 years ago
- LinkedIn reconnaissance tool☆55Updated 4 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- Pypykatz server☆125Updated 6 years ago
- A collection of my Dockerfiles☆90Updated 3 years ago
- ☆284Updated 8 years ago
- Network Pivoting Toolkit☆458Updated 2 years ago
- Lure - User Recon Automation for GoPhish☆167Updated 2 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆135Updated 5 years ago
- Disposable and resilient red team infrastructure with Terraform☆280Updated 6 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Updated 6 years ago
- This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.☆171Updated last week
- Quick Malicious ClickOnceGenerator for Red Team☆271Updated 4 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆256Updated 2 weeks ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 4 years ago