trustedsec / User-Behavior-Mapping-Tool
☆164Updated last year
Alternatives and similar repositories for User-Behavior-Mapping-Tool
Users that are interested in User-Behavior-Mapping-Tool are comparing it to the libraries listed below
Sorting:
- Finding all things on-prem Microsoft for password spraying and enumeration.☆254Updated 2 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆320Updated 2 years ago
- A tool for pointesters to find candies in SharePoint☆254Updated 2 years ago
- ☆208Updated 3 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆190Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆257Updated 3 years ago
- Enumerate Domain Data☆326Updated last year
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆386Updated last month
- Modular Enumeration and Password Spraying Framework☆117Updated last year
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆187Updated 3 years ago
- ☆190Updated 2 years ago
- User Enumeration of Microsoft Teams users via API☆156Updated last year
- User enumeration with Microsoft Teams API☆171Updated 3 years ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 4 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆70Updated 5 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆388Updated last year
- ☆98Updated 3 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆329Updated 3 weeks ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆151Updated 2 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated last month
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- ☆246Updated last year
- ☆143Updated last month
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆369Updated 11 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆488Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆329Updated last year
- GolenGMSA tool for working with GMSA passwords☆145Updated last year
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Updated last year
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆145Updated 4 years ago