-
SAFETECH.RED 🟥
- Bretagne, France
- https://www.htwmcl.fr/
- @g0h4n_0
- @g0h4n@infosec.exchange
- in/quentin-texier
- https://www.safetech.red/
ACTIVEDIRECTORY
A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).
Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Services and Enrollment Services ADCS containers to obtain Enter…
Simple script to extract useful informations from the combo BloodHound + Neo4j
Generate graphs and charts based on password cracking result
Dump NTDS with golden certificates and UnPAC the hash
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements
Kerberos relaying and unconstrained delegation abuse toolkit
A swiss army knife for pentesting networks
Tool for Active Directory Certificate Services enumeration and abuse
Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀
A Python based ingestor for BloodHound
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world.…
Six Degrees of Domain Admin
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the default settings).
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
Use ESC1 to perform a makeshift DCSync and dump hashes
Some scripts to support with importing large datasets into BloodHound