Bruteforce and enumerate Active Directory accounts through Kerberos pre-authentication.
Network service exploitation tool that helps automate assessing the security of large networks.
Active Directory Certificate Services enumeration and abuse.
Detect and fix common misconfigurations in Active Directory Certificate Services.
Active Directory data collector for BloodHound written in Rust.
ScriptSentry finds misconfigured and dangerous logon scripts.
Credentials gathering tool automating remote procdump and parse of lsass process.
Six Degrees of Domain Admin.
A swiss army knife for pentesting networks.
A (partial) Python rewriting of PowerSploit's PowerView.
The perils of the pre-Windows 2000 compatible access group in a Windows domain.
Powershell tool to automate Active Directory enumeration.
PowerShell Cmdlets to interact with BloodHound Data via Neo4j HTTP API.
Automate Active Directory Enumeration using PowerView.
Anonymously bruteforce Active Directory usernames by abusing LDAP Ping requests.
Python tool to remotely extract credentials on a set of hosts.
Retrieve information via O365 and AzureAD with valid credentials.
Password Hunter in active directory.
Quickly find uncommon shares in vast Windows domains.
Gather information about the Active Directory and generates a report.
Lateral movement graph for Azure Active Directory.
A tool to help at finding delicious candy needles in a bunch of horrible boring haystacks.
Enumerate usernames on a domain where you have no creds by using SMB relay.
Gather gather gather.
Automation for internal Windows pentest / AD-Security.
Active Directory Report Tool.
Asynchronous password spraying tool for Windows environments.
Enumerate users, groups and computers from a Windows domain through LDAP queries.
Rubeus is a toolkit for Kerberos interaction and abuses.
Automates a number of Active Directory enumeration and vulnerability.
LDAP library for auditing Microsoft Active Directory.
Active Directory assessment and privilege escalation script.
Enumerate an Active Directory environment with LDAP queries.
Find misconfiguration through LDAP to exploit weaknesses with Kerberos.