p0dalirius / crEAPLinks
crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.
☆31Updated 3 years ago
Alternatives and similar repositories for crEAP
Users that are interested in crEAP are comparing it to the libraries listed below
Sorting:
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆114Updated 4 months ago
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆27Updated 9 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- pysnaffler☆105Updated 2 months ago
- ☆92Updated 9 months ago
- ☆77Updated 9 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆48Updated 3 months ago
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆64Updated last month
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 9 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆32Updated last month
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆25Updated 6 months ago
- ☆98Updated 9 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆148Updated last week
- Custom queries list for BloodHound☆30Updated 4 months ago
- A Python POC for CRED1 over SOCKS5