ridenum
Domain controller bruter
An open-source tool designed to brute-force domain controllers using null sessions and SID to RID enumeration
Rid_enum is a null session RID cycle attack for brute forcing domain controllers.
233 stars
27 watching
81 forks
Language: Python
last commit: 4 months ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
evilsocket/dirsearch | A Go-based tool for concurrent HTTP enumeration of directories and files using a wordlist. | 269 |
darryllane/bluto | Tools for gathering information about and exploiting vulnerabilities in domains | 619 |
blark/aiodnsbrute | A tool for brute-forcing domain names by sending DNS queries asynchronously | 644 |
secforce/snmp-brute | Automates brute force attempts on network devices using SNMP protocol | 294 |
trustedsec/hate_crack | Automates password cracking using hashcat | 1,662 |
envato/zxcvbn-ruby | A password strength testing library inspired by Dropbox's JavaScript implementation | 315 |
nexxai/substr3am | Tools to enumerate subdomains by monitoring SSL certificate issuance | 66 |
twelvesec/rootend | A tool designed to automate the discovery and exploitation of security vulnerabilities in Unix systems. | 146 |
1n3/brutex | Automates the process of trying all possible combinations of service credentials on a target system to gain unauthorized access. | 1,972 |
cleanunicorn/karl | Monitors smart contracts for security vulnerabilities on blockchain networks | 315 |
quentinhardy/tpx-brute | A tool to brute-force and enumerate logon panel accounts on IBM mainframes using the TPX interface. | 17 |
trustelem/zxcvbn | A Go implementation of a realistic password strength estimator inspired by password crackers. | 68 |
david3107/squatm3gator | An online tool to enumerate and simulate domains used in phishing attacks and cybersquatting | 30 |
spiderlabs/blackbytedecryptor | A tool designed to decrypt files and directories infected with the BlackByte ransomware | 64 |
cossacklabs/acra | Database security suite with field-level encryption, search through encrypted data, SQL injections prevention and intrusion detection capabilities. | 1,357 |