zeronetworks / ldapfwLinks
Protect your Domain Controllers by auditing and restricting LDAP requests
☆157Updated last week
Alternatives and similar repositories for ldapfw
Users that are interested in ldapfw are comparing it to the libraries listed below
Sorting:
- Abusing Azure services over C2☆339Updated last week
- GolenGMSA tool for working with GMSA passwords☆150Updated last year
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆94Updated last year
- ACL Viewer for Windows☆126Updated last month
- Tool for viewing NTDS.dit☆167Updated 2 months ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆91Updated 4 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆237Updated 5 months ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆122Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆320Updated 2 years ago
- Active Directory delegation management tool☆299Updated last year
- Collection of scripts to retrieve stored passwords from Veeam Backup☆129Updated 5 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆154Updated last year
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆142Updated 3 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆224Updated 4 months ago
- Common library used by SharpHound.☆88Updated this week
- Detect WFP filters blocking EDR communications☆89Updated last year
- ☆247Updated last year
- ☆90Updated last month
- ☆151Updated 3 months ago
- ☆151Updated 4 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆173Updated 9 months ago
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- Automatically run and populate a new instance of BH CE☆81Updated last month
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆102Updated 9 months ago
- ☆13Updated 2 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆124Updated 2 years ago
- A collection of tools, scripts and personal research☆128Updated last month
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆139Updated 10 months ago
- ☆106Updated 2 years ago
- Azure DevOps Services Attack Toolkit☆141Updated 2 months ago