passtheticket / Active-Directory-Recon
Enumeration from a non-domain joined Windows computer
☆25Updated 6 months ago
Alternatives and similar repositories for Active-Directory-Recon:
Users that are interested in Active-Directory-Recon are comparing it to the libraries listed below
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- ☆117Updated 3 weeks ago
- Automated exploitation of MSSQL servers at scale☆108Updated 2 weeks ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆163Updated 4 months ago
- PowerShell Reverse Shell☆61Updated last year
- Abuse Azure API permissions for red teaming☆66Updated 2 years ago
- My Favorite Offensive Security Scripts☆70Updated last year
- ☆58Updated last week
- Lateral Movement☆122Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆171Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Python setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆105Updated 5 months ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆79Updated last year
- ☆36Updated 2 months ago
- Living off the land searches for explorer and sharepoint☆79Updated this week
- ☆97Updated 3 years ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆183Updated 8 months ago
- InfoSec Notes☆56Updated last year
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- ☆83Updated 3 months ago
- Hybrid AD utilities for ROADtools☆74Updated 2 months ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆152Updated last year
- Automatically run and populate a new instance of BH CE☆73Updated last month
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆159Updated 5 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆139Updated 9 months ago
- ☆37Updated last year
- ☆93Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆128Updated last year