Perform DCSync operation without mimikatz
-
Updated
Nov 5, 2024 - C
Perform DCSync operation without mimikatz
Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI, scans SMB/NFS shares for passwords, scans for remote accesses, dumps NTDS.dit.
This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)
Pre2KfromDCSync detects machine accounts with Pre-Windows 2000 passwords and outputs the account name, stored NT hash, and potential password from DCSync output.
A tool written in Go to perform a few penetration testing techniques in the environment with Active Directory.
Add a description, image, and links to the dcsync topic page so that developers can more easily learn about it.
To associate your repository with the dcsync topic, visit your repo's landing page and select "manage topics."