scipag / nac_bypassLinks
Script collection to bypass Network Access Control (NAC, 802.1x)
☆329Updated 6 months ago
Alternatives and similar repositories for nac_bypass
Users that are interested in nac_bypass are comparing it to the libraries listed below
Sorting:
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆329Updated 3 years ago
- Kerberoast attack -pure python-☆436Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆237Updated 3 years ago
- LDAP library for auditing MS AD☆477Updated last month
- ☆191Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆346Updated last year
- ☆200Updated 6 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆267Updated 2 years ago
- scan for NTLM directories☆375Updated 3 months ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆402Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆223Updated 3 years ago
- Maximizing BloodHound. Max is a good boy.☆528Updated 7 months ago
- Password spraying tool and Bloodhound integration☆247Updated 11 months ago
- Dumping LAPS from Python☆283Updated 3 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆271Updated 2 years ago
- Python script that performs email address validation against Office 365 without submitting login attempts.☆371Updated 5 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆494Updated 2 years ago
- Chameleon: A tool for evading Proxy categorisation☆508Updated last year
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆306Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆406Updated 8 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆447Updated 2 years ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆260Updated 8 months ago
- Inject remote template link into word document for remote template injection☆183Updated 4 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆358Updated last month
- Infrastructure Automation☆357Updated last year
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆145Updated 3 years ago
- Roast in the Middle☆293Updated 2 months ago
- A tool for pointesters to find candies in SharePoint☆271Updated 3 years ago
- ☆405Updated 4 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆398Updated 3 months ago