oldboy21 / LDAP-Password-HunterLinks
Password Hunter in Active Directory
☆198Updated 2 years ago
Alternatives and similar repositories for LDAP-Password-Hunter
Users that are interested in LDAP-Password-Hunter are comparing it to the libraries listed below
Sorting:
- Lookup for interesting stuff in SMB shares☆150Updated 2 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Updated 3 weeks ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆218Updated 5 years ago
- User enumeration with Microsoft Teams API☆174Updated 4 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆179Updated 4 years ago
- Collection of cyphers for bloodhound☆154Updated last year
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257Updated 3 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆447Updated 2 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆198Updated 3 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 4 years ago
- Phishing Framework for Pentesters☆198Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆179Updated 7 months ago
- ☆154Updated 3 weeks ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆306Updated 2 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆285Updated last year
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆326Updated 2 years ago
- scan for NTLM directories☆374Updated 3 months ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆257Updated 3 years ago
- Active Directory Lab for Penetration Testing☆52Updated 3 months ago
- Office 365 and Exchange Enumeration☆195Updated 6 years ago
- Enumerate Domain Data☆334Updated 2 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆444Updated 2 years ago
- Open-Source Collection of Social Engineering Pretexts☆142Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated 2 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆225Updated 4 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Updated 3 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆149Updated 4 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆231Updated 4 years ago