surajpkhetani / Active-Directory-Permission-Abuse
☆12Updated 2 years ago
Alternatives and similar repositories for Active-Directory-Permission-Abuse:
Users that are interested in Active-Directory-Permission-Abuse are comparing it to the libraries listed below
- Scripts to interact with Microsoft Graph APIs☆33Updated 3 months ago
- Find Inbound Email Domains☆21Updated last year
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 5 months ago
- Federated Office365 user enumeration based on correlated response trend analysis☆48Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 8 months ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆17Updated 10 months ago
- .NET wrapper around LogonUserA to test creds☆11Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆78Updated last year
- My BloodHound custom queries☆23Updated 2 years ago
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 3 years ago
- ☆24Updated 3 years ago
- ☆15Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- ☆15Updated last year
- ☆71Updated last year
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆31Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆13Updated 5 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆13Updated 2 years ago
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆40Updated 2 months ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆47Updated last year
- (kinda) Malicious Outlook Reader☆18Updated 3 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆25Updated 6 months ago
- Smuggle a file to a user's browser☆19Updated 2 years ago