ricardojoserf / ntds-analyzerLinks
A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.
☆15Updated 4 years ago
Alternatives and similar repositories for ntds-analyzer
Users that are interested in ntds-analyzer are comparing it to the libraries listed below
Sorting:
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆18Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- ☆32Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- ☆15Updated last month
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- .NET wrapper around LogonUserA to test creds☆12Updated 3 years ago
- Tool to perform lateral movement between AAD joined devices☆61Updated 3 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- A python based script to update DNS entries in ADIDNS☆40Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆23Updated 2 years ago
- ☆24Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- My BloodHound custom queries☆23Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 3 months ago
- ☆20Updated 5 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12Updated 4 years ago
- Pwdlyser is an all encompassing security auditing tool. This repo serves as the open-source base for the new version of Pwdlyser (previou…☆25Updated 9 months ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Updated last year
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago