ansible-ad-inventory
sam-the-admin
Our great sponsors
ansible-ad-inventory | sam-the-admin | |
---|---|---|
2 | 4 | |
33 | 955 | |
- | - | |
1.2 | 0.0 | |
about 1 year ago | almost 2 years ago | |
Python | Python | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ansible-ad-inventory
-
Variable in inventory file (yml) and plugin
That works so far. I have in the playbook then the ansible_password variable which is stored per vault. So far everything is fine. But now I don't want to hardcode the servers in the test environment but they should come from AD groups. For this I use an AD plugin: https://github.com/mdhowle/ansible-ad-inventory
-
Help! I am mentally unable to learn ansible!
Did some quick googling, did you check this out? https://github.com/mdhowle/ansible-ad-inventory
sam-the-admin
What are some alternatives?
vsphere-automation-sdk-python - Python samples, language bindings, and API reference documentation for vSphere, VMC, and NSX-T using the VMware REST API
CrackMapExec - A swiss army knife for pentesting networks
ansible-hvault-inventory - Using HashiCorp Vault as a dynamic Ansible inventory and authentication service
pywerview - A (partial) Python rewriting of PowerSploit's PowerView
Crack-O-Matic - Find and notify users in your Active Directory with weak passwords
SQLMap - Automatic SQL injection and database takeover tool
GoodHound - Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
ldapcherry - Web UI for managing users and groups in multiple directory services.
AutoSploit - Automated Mass Exploiter
chophound - Some scripts to support with importing large datasets into BloodHound