zeronetworks / ldapfwLinks
Protect your Domain Controllers by auditing and restricting LDAP requests
☆177Updated 6 months ago
Alternatives and similar repositories for ldapfw
Users that are interested in ldapfw are comparing it to the libraries listed below
Sorting:
- GolenGMSA tool for working with GMSA passwords☆164Updated 3 months ago
- Collection of scripts to retrieve stored passwords from Veeam Backup☆140Updated 6 months ago
- ACL Viewer for Windows☆132Updated 7 months ago
- Tool for viewing NTDS.dit☆189Updated 9 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆268Updated 11 months ago
- Abusing Azure services over C2☆366Updated 6 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆97Updated last month
- A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.☆251Updated 2 months ago
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆173Updated 4 months ago
- Detect WFP filters blocking EDR communications☆95Updated last year
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆130Updated 4 years ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆163Updated last month
- Location of some Active Directory lab scripts I have created and find useful☆85Updated 3 weeks ago
- Azure DevOps Services Attack Toolkit☆150Updated 9 months ago
- ☆252Updated 2 years ago
- Active Directory delegation management tool☆377Updated last month
- Active Directory Firewall☆92Updated 2 weeks ago
- DNS Tunneling using powershell to download and execute a payload. Works in CLM.☆229Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆322Updated 3 years ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆153Updated last week
- ☆176Updated this week
- A BloodHound collector for Microsoft Configuration Manager☆355Updated 5 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Updated 2 years ago
- ☆107Updated 2 years ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆163Updated last year
- An Ansible collection that installs an SCCM deployment with optional configurations.☆97Updated last week
- ☆302Updated last year
- ☆13Updated 3 years ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆133Updated 3 months ago
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆131Updated last year