https://github.com/byt3n33dl3/exchangeberos
NTLM Relay and Kerberos Attacks with ACL abuse capabilities.
https://github.com/cgohlke/uciwebauth
Access UCI WebAuth, LDAP person records, and Active Directory user objects.
https://github.com/byt3n33dl3/bark
BloodHound Attack Research Kit. BARK is an Attack Kit for Attack path Management.
https://github.com/byt3n33dl3/gxc-bloodhuntr
Veins and Blood hunting knife collections for Active Directory Execution process.
https://github.com/byt3n33dl3/neokerberoast
Combining "Authentication" to convey on Active Directory. Advanced Kerberos attacks.
https://github.com/byt3n33dl3/sharkmapexec
Used to be C2-agents and implants for stealth operation tools for BlackMarlinExec.
https://github.com/byt3n33dl3/crackmapkeros
Kerberos Attacks by cracking the system or router that provides a gateway for Active Directory.
https://github.com/byt3n33dl3/thc-kerbhuntr
Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.
cochise
Autonomous Assumed Breach Penetration-Testing Active Directory Networks
https://github.com/byt3n33dl3/crackmapexec
A swiss army Knife for Penetration testing Networks and Active Directory.