sikumy / sauronLinks
Fast context enumeration for newly obtained Active Directory credentials.
☆83Updated 2 months ago
Alternatives and similar repositories for sauron
Users that are interested in sauron are comparing it to the libraries listed below
Sorting:
- Living off the land searches for explorer and sharepoint☆90Updated 6 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 3 months ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆148Updated 3 months ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆76Updated 7 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆104Updated 3 weeks ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆95Updated 2 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆32Updated last month
- A Python POC for CRED1 over SOCKS5☆160Updated last year
- ☆117Updated 5 months ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆207Updated this week
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated 10 months ago
- Utilities for obfuscating shellcode☆94Updated last month
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆201Updated last year
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆88Updated this week
- Leveraging AWS Lambda Function URLs for C2 Redirection☆44Updated 2 years ago
- pysnaffler☆105Updated 2 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆35Updated 8 months ago
- OAuth Device Code Phishing Toolkit☆92Updated 2 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated last year
- ☆161Updated last year
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆120Updated 2 weeks ago
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆70Updated 11 months ago
- Group Policy Objects manipulation and exploitation framework☆269Updated last month
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆236Updated last week
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 11 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago
- Client-side Encrypted Upload Server Python Script☆65Updated 4 months ago
- Enumerate Domain Users Without Authentication☆270Updated 6 months ago
- Parses Snaffler output file and generate beautified outputs.☆109Updated 9 months ago