DeathStar

AD exploit tool

Automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using offensive TTPs

Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.

GitHub

2k stars
80 watching
328 forks
Language: Python
last commit: 10 months ago
Linked from 1 awesome list

active-directorypentestingpythonsecurity

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
deanofcyber/active-directory-penetration-testing-and-security A collection of resources and documentation for testing and securing Active Directory environments 30
curi0usjack/adimporter Tools for generating realistic test user accounts in Active Directory 69
ad-attacks/active-directory-penetration-testing A comprehensive resource for learning and practicing penetration testing on Active Directory infrastructures 16
thunlp/openattack A Python toolkit for generating adversarial examples to test the robustness of natural language processing models 689
securityinnovation/authmatrix An extension to Burp Suite for testing authorization in web applications and web services 614
dirkjanm/roadtools A Python-based framework for interacting with Azure AD and exploring its internal data structure. 1,906
fire-dragon-dol/active_admin-extensions A collection of extensions for improving the functionality and usability of the ActiveAdmin framework. 4
byt3bl33d3r/silenttrinity An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks. 2,196
cravaterouge/bloodyad An Active Directory Privilege Escalation Framework using Python 1,238
aur3lius-dev/spydir Automates endpoint enumeration in web applications by processing source code directories 22
csababarta/ntdsxtract A Python-based tool for extracting and analyzing data from Windows domain controllers to aid in Active Directory forensic investigations 319
c3r3br4t3/shadowrdp Tools to exploit remote desktop sessions using NTLM and Kerberos authentication 61
anirudhbiyani/findmytakeover Detects DNS record misconfigurations that could be exploited by attackers 135
fox-it/aclpwn.py Exploits vulnerabilities in Active Directory due to misconfigured ACLs using Python and BloodHound 702
scorphus/tsuru-plugins Tools for inspecting and manipulating the configuration of applications running on a container orchestration platform 38