scipag / nac_bypass
Script collection to bypass Network Access Control (NAC, 802.1x)
☆305Updated 2 months ago
Alternatives and similar repositories for nac_bypass:
Users that are interested in nac_bypass are comparing it to the libraries listed below
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆304Updated 2 years ago
- LDAP library for auditing MS AD☆417Updated last month
- ☆190Updated last year
- Kerberoast attack -pure python-☆430Updated last year
- Password spraying tool and Bloodhound integration☆232Updated 4 months ago
- scan for NTLM directories☆359Updated 10 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆232Updated 3 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆493Updated 5 months ago
- Chameleon: A tool for evading Proxy categorisation☆492Updated 5 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆388Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆195Updated 3 months ago
- ☆150Updated last year
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆241Updated last month
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆488Updated 2 years ago
- Dumping LAPS from Python☆267Updated 2 years ago
- ☆383Updated 4 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- ☆220Updated 2 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆144Updated 2 years ago
- Hiding GoPhish from the boys in blue☆181Updated 2 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆368Updated 11 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆384Updated last month
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆258Updated last year
- Retrieve LAPS password from LDAP☆410Updated 4 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆252Updated last year
- Inject remote template link into word document for remote template injection☆174Updated 4 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆460Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆300Updated last year
- Maximizing BloodHound. Max is a good boy.☆515Updated 2 weeks ago