skelsec / kerberoastLinks
Kerberoast attack -pure python-
☆434Updated last year
Alternatives and similar repositories for kerberoast
Users that are interested in kerberoast are comparing it to the libraries listed below
Sorting:
- Active Directory ACL exploitation with BloodHound☆727Updated 3 years ago
- LDAP library for auditing MS AD☆421Updated last week
- PowerSploit - A PowerShell Post-Exploitation Framework☆232Updated 3 years ago
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆306Updated 2 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆860Updated 3 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆227Updated 2 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆781Updated 2 years ago
- ☆522Updated 2 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆439Updated 3 years ago
- Exchange privilege escalations to Active Directory☆766Updated 2 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆363Updated 4 years ago
- Malicious WMI Events using PowerShell☆387Updated 8 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆542Updated 2 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆447Updated 2 years ago
- Chameleon: A tool for evading Proxy categorisation☆496Updated 6 months ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆518Updated 2 years ago
- An script to perform kerberos bruteforcing by using impacket☆449Updated 3 years ago
- Dumping LAPS from Python☆267Updated 2 years ago
- NTLMv1 Multitool☆620Updated last month
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆382Updated 4 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆217Updated 4 years ago
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆673Updated 6 months ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆262Updated last year
- Check for LDAP protections regarding the relay of NTLM authentication☆492Updated 6 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆483Updated 11 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆389Updated last year
- Active Directory Integrated DNS dumping by any authenticated user☆1,007Updated 2 months ago
- ☆395Updated 9 months ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 3 years ago
- scan for NTLM directories☆359Updated last week