passtheticket / Active-Directory-ReconLinks
Enumeration from a non-domain joined Windows computer
☆27Updated 9 months ago
Alternatives and similar repositories for Active-Directory-Recon
Users that are interested in Active-Directory-Recon are comparing it to the libraries listed below
Sorting:
- My Favorite Offensive Security Scripts☆75Updated 3 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆190Updated 11 months ago
- Cortex XDR Config Extractor☆133Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆114Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆133Updated last year
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆112Updated last week
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆165Updated last month
- ☆179Updated 8 months ago
- ☆163Updated 9 months ago
- Automatically run and populate a new instance of BH CE☆95Updated last week
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated 2 months ago
- Azure AD cheatsheet for the CARTP course☆128Updated 3 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated last year
- ☆183Updated 2 months ago
- ☆95Updated 2 months ago
- 🌩️ Collection of BloodHound queries for Azure☆75Updated 7 months ago
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆182Updated 11 months ago
- ☆100Updated 3 years ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆167Updated last year
- ☆159Updated last year
- PowerShell Reverse Shell☆78Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 8 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- ☆86Updated 6 months ago
- Azure DevOps Services Attack Toolkit☆146Updated 4 months ago