DeathStar
AD exploit tool
Automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using offensive TTPs
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
2k stars
80 watching
328 forks
Language: Python
last commit: 10 months ago
Linked from 1 awesome list
active-directorypentestingpythonsecurity
Related projects:
Repository | Description | Stars |
---|---|---|
deanofcyber/active-directory-penetration-testing-and-security | A collection of resources and documentation for testing and securing Active Directory environments | 30 |
curi0usjack/adimporter | Tools for generating realistic test user accounts in Active Directory | 69 |
ad-attacks/active-directory-penetration-testing | A comprehensive resource for learning and practicing penetration testing on Active Directory infrastructures | 16 |
thunlp/openattack | A Python toolkit for generating adversarial examples to test the robustness of natural language processing models | 689 |
securityinnovation/authmatrix | An extension to Burp Suite for testing authorization in web applications and web services | 614 |
dirkjanm/roadtools | A Python-based framework for interacting with Azure AD and exploring its internal data structure. | 1,906 |
fire-dragon-dol/active_admin-extensions | A collection of extensions for improving the functionality and usability of the ActiveAdmin framework. | 4 |
byt3bl33d3r/silenttrinity | An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks. | 2,196 |
cravaterouge/bloodyad | An Active Directory Privilege Escalation Framework using Python | 1,238 |
aur3lius-dev/spydir | Automates endpoint enumeration in web applications by processing source code directories | 22 |
csababarta/ntdsxtract | A Python-based tool for extracting and analyzing data from Windows domain controllers to aid in Active Directory forensic investigations | 319 |
c3r3br4t3/shadowrdp | Tools to exploit remote desktop sessions using NTLM and Kerberos authentication | 61 |
anirudhbiyani/findmytakeover | Detects DNS record misconfigurations that could be exploited by attackers | 135 |
fox-it/aclpwn.py | Exploits vulnerabilities in Active Directory due to misconfigured ACLs using Python and BloodHound | 702 |
scorphus/tsuru-plugins | Tools for inspecting and manipulating the configuration of applications running on a container orchestration platform | 38 |