passtheticket / Active-Directory-Recon
Enumeration from a non-domain joined Windows computer
☆24Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for Active-Directory-Recon
- My Favorite Offensive Security Scripts☆62Updated last year
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆81Updated last week
- Python setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆78Updated last week
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆166Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆54Updated 11 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆36Updated last week
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆85Updated last year
- PowerShell Reverse Shell☆61Updated last year
- Lateral Movement☆118Updated 11 months ago
- ☆95Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- ☆34Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated last year
- Cortex XDR Config Extractor☆119Updated last year
- Powershell version of SharpGPOAbuse☆70Updated 3 years ago
- ☆92Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 7 months ago
- Azure AD enumeration over MS Graph