passtheticket / Active-Directory-Recon
Enumeration from a non-domain joined Windows computer
☆24Updated 4 months ago
Alternatives and similar repositories for Active-Directory-Recon:
Users that are interested in Active-Directory-Recon are comparing it to the libraries listed below
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- My Favorite Offensive Security Scripts☆66Updated last year
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- ☆43Updated 7 months ago
- Lateral Movement☆122Updated last year
- ☆35Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆158Updated 2 months ago
- Automated exploitation of MSSQL servers at scale☆106Updated 3 weeks ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆148Updated last year
- ☆43Updated 3 weeks ago
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 10 months ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated last year
- Living off the land searches for explorer and sharepoint☆56Updated 3 months ago
- Abuse Azure API permissions for red teaming☆61Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆57Updated last month
- ☆113Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆114Updated last year
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆82Updated last year
- PowerShell Reverse Shell☆61Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆76Updated 2 weeks ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆22Updated last month
- Azure DevOps Services Attack Toolkit☆137Updated 6 months ago
- Inject RDPThief into memory with PowerShell.☆60Updated last month
- A Python POC for CRED1 over SOCKS5☆139Updated 4 months ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆78Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated 2 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆89Updated last year