p0dalirius / pyLAPSLinks
Python setter/getter for property ms-Mcs-AdmPwd used by LAPS.
☆111Updated 8 months ago
Alternatives and similar repositories for pyLAPS
Users that are interested in pyLAPS are comparing it to the libraries listed below
Sorting:
- ☆161Updated 8 months ago
- ☆63Updated 5 months ago
- Impacket is a collection of Python classes for working with network protocols.☆74Updated 10 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- Powershell version of SharpGPOAbuse☆83Updated 4 years ago
- Automated exploitation of MSSQL servers at scale☆109Updated 3 weeks ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆86Updated 3 years ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆187Updated 11 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆164Updated 2 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆137Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆252Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆314Updated 8 months ago
- ☆159Updated last year
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆159Updated last year
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆155Updated 2 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆102Updated 3 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆256Updated 2 weeks ago
- Custom Queries - Brought Up to BH4.1 syntax☆256Updated 2 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated last year
- Enumerate Domain Users Without Authentication☆239Updated 2 months ago
- ADCS cert template modification and ACL enumeration☆137Updated 2 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆227Updated last month
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆118Updated 3 months ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆123Updated 5 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆129Updated 5 months ago
- ADCS abuser☆296Updated 2 years ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆104Updated this week
- Use ESC1 to perform a makeshift DCSync and dump hashes☆209Updated last year
- ☆206Updated last year