passtheticket / Active-Directory-ReconLinks
Enumeration from a non-domain joined Windows computer
☆32Updated last year
Alternatives and similar repositories for Active-Directory-Recon
Users that are interested in Active-Directory-Recon are comparing it to the libraries listed below
Sorting:
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆116Updated last year
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆204Updated last year
- ☆197Updated 4 months ago
- My Favorite Offensive Security Scripts☆82Updated 8 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆139Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆82Updated last year
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆127Updated last month
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated last year
- ☆98Updated 3 years ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆177Updated 2 years ago
- ☆184Updated last year
- Just some random Red Team Scripts that can be useful☆154Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆180Updated 8 months ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258Updated 3 years ago
- ☆120Updated 9 months ago
- Azure AD cheatsheet for the CARTP course☆142Updated 3 years ago
- Azure DevOps Services Attack Toolkit☆150Updated 10 months ago
- ☆24Updated 3 months ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- ☆101Updated 2 months ago
- Automatically run and populate a new instance of BH CE☆113Updated 2 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆144Updated last year
- AzureAD Pentest☆25Updated 3 years ago
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- ☆52Updated last year