p0dalirius / DomainUsersToXLSX
Extract all users from an Active Directory domain to an Excel worksheet.
☆32Updated 3 months ago
Alternatives and similar repositories for DomainUsersToXLSX
Users that are interested in DomainUsersToXLSX are comparing it to the libraries listed below
Sorting:
- A python wrapper to run a command on against all users/computers/DCs of a Windows Domain☆27Updated 2 years ago
- ☆86Updated last year
- ☆52Updated 3 years ago
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆21Updated 3 months ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆76Updated 2 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Updated 4 years ago
- Secretsdump C# version only supporting local (live) operation☆49Updated 3 weeks ago
- SAM Dumping in C#☆48Updated 3 months ago
- ☆49Updated 2 years ago
- Aggressor script add-in for CobaltStrike to track file uploads☆36Updated 2 years ago
- C# Port of LdapRelayScan☆83Updated 3 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 7 months ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆86Updated 2 years ago
- Winsocket for Cobalt Strike.☆98Updated last year
- Python3 HTTP Server with upload functionality☆13Updated last year
- Groovy Post Exploitation☆20Updated 6 months ago
- Lsass dumper evading (some) EDR detection☆23Updated 2 months ago
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆110Updated 2 years ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆40Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆94Updated last year
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆52Updated 2 years ago
- ☆70Updated last year
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures …☆34Updated 11 months ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆26Updated 2 years ago
- ☆97Updated last year
- To audit the security of read-only domain controllers☆116Updated last year
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago