stephenbradshaw / ad_ldap_dumper
Security focused tool for dumping information from Active Directory via LDAP
☆14Updated last month
Alternatives and similar repositories for ad_ldap_dumper:
Users that are interested in ad_ldap_dumper are comparing it to the libraries listed below
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆26Updated last year
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆25Updated 2 years ago
- A little implant which SSH's back with a shell☆36Updated 2 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆17Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 6 months ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆42Updated 3 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- Execute Mimikatz with different technique☆50Updated 3 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 3 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆21Updated 5 years ago
- miscellaneous sploit scripts/hacks☆14Updated 6 months ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆46Updated 3 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆25Updated 4 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- Reverse shell macro using Word VBA☆13Updated 4 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- ☆16Updated 4 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆28Updated 5 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆36Updated 3 years ago
- Searching .evtx logs for remote connections☆24Updated last year
- I used this to see if an EDR is running in Safe Mode☆34Updated 3 years ago