SwiftOnSecurity/OrgKit
Provision a brand-new company with proper defaults in Windows, Offic365, and Azure
#active_directory #azure #office_365 #template #windows #windows_10
Stars: 137 Issues: 1 Forks: 2
https://github.com/SwiftOnSecurity/OrgKit
  
  Provision a brand-new company with proper defaults in Windows, Offic365, and Azure
#active_directory #azure #office_365 #template #windows #windows_10
Stars: 137 Issues: 1 Forks: 2
https://github.com/SwiftOnSecurity/OrgKit
GitHub
  
  GitHub - SwiftOnSecurity/OrgKit: Provision a brand-new company with proper defaults in Windows, Offic365, and Azure
  Provision a brand-new company with proper defaults in Windows, Offic365, and Azure - SwiftOnSecurity/OrgKit
  0Kee-Team/WatchAD
AD Security Intrusion Detection System
Language: Python
#active_directory #blue_team #defcon27 #event_log #intrusion_detection_system #kerberos #ntlm #python3 #security #watchad
Stars: 98 Issues: 0 Forks: 17
https://github.com/0Kee-Team/WatchAD
  
  AD Security Intrusion Detection System
Language: Python
#active_directory #blue_team #defcon27 #event_log #intrusion_detection_system #kerberos #ntlm #python3 #security #watchad
Stars: 98 Issues: 0 Forks: 17
https://github.com/0Kee-Team/WatchAD
GitHub
  
  GitHub - Qianlitp/WatchAD: AD Security Intrusion Detection System
  AD Security Intrusion Detection System. Contribute to Qianlitp/WatchAD development by creating an account on GitHub.
  WazeHell/sam-the-admin
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
Language: Python
#active_directory #exploitation #redteam #s4u2self
Stars: 197 Issues: 0 Forks: 43
https://github.com/WazeHell/sam-the-admin
  
  Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
Language: Python
#active_directory #exploitation #redteam #s4u2self
Stars: 197 Issues: 0 Forks: 43
https://github.com/WazeHell/sam-the-admin
GitHub
  
  GitHub - safebuffer/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
  Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user  - GitHub - safebuffer/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from st...
  lkarlslund/ldapnomnom
Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)
Language: Go
#active_directory #bruteforce #bruteforcer #cldap #ldap
Stars: 189 Issues: 0 Forks: 18
https://github.com/lkarlslund/ldapnomnom
  
  Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)
Language: Go
#active_directory #bruteforce #bruteforcer #cldap #ldap
Stars: 189 Issues: 0 Forks: 18
https://github.com/lkarlslund/ldapnomnom
GitHub
  
  GitHub - lkarlslund/ldapnomnom: Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers…
  Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP) - lkarlslund/ldapnomnom
🔥3
  OPENCYBER-FR/RustHound
Active Directory data collector for BloodHound written in rust. 🦀
Language: Rust
#active_directory #bloodhound #collector #cross_compiled #cross_platform #network #pentesting #rust #windows
Stars: 175 Issues: 2 Forks: 8
https://github.com/OPENCYBER-FR/RustHound
  
  Active Directory data collector for BloodHound written in rust. 🦀
Language: Rust
#active_directory #bloodhound #collector #cross_compiled #cross_platform #network #pentesting #rust #windows
Stars: 175 Issues: 2 Forks: 8
https://github.com/OPENCYBER-FR/RustHound
GitHub
  
  GitHub - NH-RED-TEAM/RustHound: Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀
  Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀 - NH-RED-TEAM/RustHound
💩5🔥1
  