sam-the-admin
ansible-ad-inventory
Our great sponsors
sam-the-admin | ansible-ad-inventory | |
---|---|---|
4 | 2 | |
955 | 33 | |
- | - | |
0.0 | 1.2 | |
almost 2 years ago | about 1 year ago | |
Python | Python | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
sam-the-admin
ansible-ad-inventory
-
Variable in inventory file (yml) and plugin
That works so far. I have in the playbook then the ansible_password variable which is stored per vault. So far everything is fine. But now I don't want to hardcode the servers in the test environment but they should come from AD groups. For this I use an AD plugin: https://github.com/mdhowle/ansible-ad-inventory
-
Help! I am mentally unable to learn ansible!
Did some quick googling, did you check this out? https://github.com/mdhowle/ansible-ad-inventory
What are some alternatives?
CrackMapExec - A swiss army knife for pentesting networks
vsphere-automation-sdk-python - Python samples, language bindings, and API reference documentation for vSphere, VMC, and NSX-T using the VMware REST API
pywerview - A (partial) Python rewriting of PowerSploit's PowerView
ansible-hvault-inventory - Using HashiCorp Vault as a dynamic Ansible inventory and authentication service
SQLMap - Automatic SQL injection and database takeover tool
Crack-O-Matic - Find and notify users in your Active Directory with weak passwords
ldapcherry - Web UI for managing users and groups in multiple directory services.
GoodHound - Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
AutoSploit - Automated Mass Exploiter
chophound - Some scripts to support with importing large datasets into BloodHound