DeathStar
AD exploit tool
Automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using offensive TTPs
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
2k stars
80 watching
328 forks
Language: Python
last commit: about 1 year ago
Linked from 1 awesome list
active-directorypentestingpythonsecurity
Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of resources and documentation for testing and securing Active Directory environments | 30 |
| Tools for generating realistic test user accounts in Active Directory | 69 |
| A comprehensive resource for learning and practicing penetration testing on Active Directory infrastructures | 16 |
| A Python toolkit for generating adversarial examples to test the robustness of natural language processing models | 699 |
| An extension to Burp Suite for testing authorization in web applications and web services | 615 |
| A Python-based framework for interacting with Azure AD and exploring its internal data structure. | 1,938 |
| A collection of extensions for improving the functionality and usability of the ActiveAdmin framework. | 4 |
| An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks. | 2,204 |
| An Active Directory Privilege Escalation Framework using Python | 1,280 |
| Automates endpoint enumeration in web applications by processing source code directories | 22 |
| A Python-based tool for extracting and analyzing data from Windows domain controllers to aid in Active Directory forensic investigations | 321 |
| Tools to exploit remote desktop sessions using NTLM and Kerberos authentication | 62 |
| Detects DNS record misconfigurations that could be exploited by attackers | 135 |
| Exploits vulnerabilities in Active Directory due to misconfigured ACLs using Python and BloodHound | 704 |
| Tools for inspecting and manipulating the configuration of applications running on a container orchestration platform | 38 |