Updated 5 months ago

https://github.com/cgohlke/uciwebauth • Rank 6.0 • Science 10%

Access UCI WebAuth, LDAP person records, and Active Directory user objects.

Updated 6 months ago

https://github.com/byt3n33dl3/bark • Rank 2.6 • Science 13%

BloodHound Attack Research Kit. BARK is an Attack Kit for Attack path Management.

Updated 6 months ago

https://github.com/byt3n33dl3/gxc-bloodhuntr • Rank 0.7 • Science 13%

Veins and Blood hunting knife collections for Active Directory Execution process.

Updated 6 months ago

https://github.com/byt3n33dl3/neokerberoast • Science 13%

Combining "Authentication" to convey on Active Directory. Advanced Kerberos attacks.

Updated 6 months ago

https://github.com/byt3n33dl3/sharkmapexec • Science 26%

Used to be C2-agents and implants for stealth operation tools for BlackMarlinExec.

Updated 6 months ago

https://github.com/byt3n33dl3/crackmapkeros • Science 13%

Kerberos Attacks by cracking the system or router that provides a gateway for Active Directory.

Updated 6 months ago

https://github.com/byt3n33dl3/thc-kerbhuntr • Science 13%

Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.

Updated 6 months ago

cochise • Science 54%

Autonomous Assumed Breach Penetration-Testing Active Directory Networks