ricardojoserf / ntds-analyzer
A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.
☆14Updated 3 years ago
Alternatives and similar repositories for ntds-analyzer:
Users that are interested in ntds-analyzer are comparing it to the libraries listed below
- ☆19Updated 4 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Tool to perform lateral movement between AAD joined devices☆53Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- ☆17Updated last year
- Ansible role that Installs Mythic☆14Updated 7 months ago
- ☆38Updated 6 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Helpful operator notes and techniques in actionable form☆16Updated last year
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- PetitPotam fork with Kerberos support in the impacket script☆17Updated 3 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆28Updated 3 years ago
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Updated last year
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Random scripts for azure stuff☆11Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- Pwnage☆15Updated this week
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆17Updated 4 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- ☆16Updated 7 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago