A swiss army knife for pentesting networks
-
Updated
Dec 6, 2023 - Python
A swiss army knife for pentesting networks
The Network Execution Tool
Investigate malicious Windows logon by visualizing and analyzing Windows event log
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
AD Security Intrusion Detection System
Bloodhound Reporting for Blue and Purple Teams
A (partial) Python rewriting of PowerSploit's PowerView
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
Modern tactical exploitation toolkit.
Collection of knowledge about information security
Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE accesses.
Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel
A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.
Execute commands interactively on remote Windows machines using the WinRM protocol (just faster)
gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory environment.
An LDAP based Active Directory user and group enumeration tool
Univention Corporate Server
Add a description, image, and links to the active-directory topic page so that developers can more easily learn about it.
To associate your repository with the active-directory topic, visit your repo's landing page and select "manage topics."