RustHound
Active Directory data collector for BloodHound written in Rust. 🦀 (by NH-RED-TEAM)
Certipy
Tool for Active Directory Certificate Services enumeration and abuse (by ly4k)
Our great sponsors
RustHound | Certipy | |
---|---|---|
1 | 9 | |
868 | 2,130 | |
3.2% | - | |
6.4 | 4.3 | |
about 2 months ago | 5 days ago | |
Rust | Python | |
MIT License | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
RustHound
Posts with mentions or reviews of RustHound.
We have used some of these posts to build our list of alternatives
and similar projects.
Certipy
Posts with mentions or reviews of Certipy.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-04-29.
-
Pentester PSA: Check your Active Directory Certificate Services (AD CS) For Vulnerabilities
I definitely recommend running Certipy or Certify (compiled binary) to see if you can identify any vulnerabilities in your environment. As far as I know, this stuff won't come up on a Nessus scan. I know when I was a sysadmin I set this up insecurely (has now been fixed). However, AD CS is easy to set up ADCS knowing some of the security implications of the configurations.
-
What recognition methods for privilege escalation in Windows do you use??
I have found something on how to consult the certification templates, first we access "https://github.com/ly4k/Certipy/blob/main/customqueries.json" . We copy the content in raw, we go to /root/.config/Bloodhound/ and copy the content in "customqueries.json" , now when we open Bloodhound we will see a section dedicated to certificate templates. Thank you all, I hope that what I share will help you for a more advanced use of BloodHound, once we have this, with Certipy ( pip3 install certipy-ad ), we download the information and export it to bloodhound
- Certificate tracking suggestions?
- Certipy: Ad Certificate Services (AD CS) misconfig enumeration and abuse
- GitHub - ollypwn/Certipy: Python implementation for Active Directory certificate abuse
- Certipy is a Python tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS).
- RT @ollypwn: Python implementation for AD CS abuse. Find, request, and authenticate your way to Domain Admin - or try your luck with "auto"…
- Certipy: Python implementation for Active Directory certificate abuse
- Active Directory Certificate Services to Domain Admin
What are some alternatives?
When comparing RustHound and Certipy you can also consider the following projects:
chophound - Some scripts to support with importing large datasets into BloodHound
Certify - Active Directory certificate abuse.
cobaltstrike-beacon-rust - CobaltStrike beacon in rust
EPI - Threadless Process Injection through entry point hijacking
violin - A no_std no alloc implementation of the Vivaldi network coordinate system in Rust
heim - Cross-platform async library for system information fetching 🦀