w0Tx / generate-ad-username
Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...
☆19Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for generate-ad-username
- A Python based ingestor for BloodHound☆81Updated 2 years ago
- ☆66Updated 4 years ago
- ☆112Updated last year
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆41Updated 5 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆166Updated last year
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆82Updated this week
- PrintNightmare (CVE-2021-34527) PoC Exploit☆106Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆36Updated 3 weeks ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆78Updated 2 years ago
- SeManageVolumePrivilege to SYSTEM☆71Updated last year
- Shellcode generation and encoding utility☆21Updated 2 years ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆36Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆67Updated 3 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- ☆46Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆79Updated 3 years ago
- PowerShell Reverse Shell☆61Updated last year
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- AV EVASION TECHNIQUES☆74Updated 2 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆62Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆88Updated last year
- ☆81Updated last year
- ☆25Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆75Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated last year
- ☆36Updated last month
- ☆118Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆58Updated this week