oldboy21 / LDAP-Password-HunterLinks
Password Hunter in Active Directory
☆199Updated 2 years ago
Alternatives and similar repositories for LDAP-Password-Hunter
Users that are interested in LDAP-Password-Hunter are comparing it to the libraries listed below
Sorting:
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆176Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated this week
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 3 years ago
- scan for NTLM directories☆366Updated last week
- Enumerate Domain Data☆332Updated last year
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆278Updated last year
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆219Updated 4 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆197Updated 2 years ago
- User enumeration with Microsoft Teams API☆173Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆443Updated 2 years ago
- Collection of cyphers for bloodhound☆149Updated last year
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257Updated 3 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago
- Office 365 and Exchange Enumeration☆190Updated 6 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆259Updated 3 years ago
- Phishing Framework for Pentesters☆197Updated 2 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆177Updated 2 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆228Updated 4 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆327Updated 2 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆217Updated 3 years ago
- Active Directory Lab for Penetration Testing☆52Updated last month
- ☆151Updated 2 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆223Updated 4 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆191Updated 4 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆444Updated last year
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Updated 3 years ago
- Open-Source Collection of Social Engineering Pretexts☆140Updated last year