Pentesting Notebook
Ctrlk
  • Offensive security
    • Tooling
    • Virtualisation
    • Active Directory
      • Domain Recon
        • Netexec (former CME)
        • PowerView
        • BloodHound
        • PingCastle
        • LDAP enum
        • RDP Password Spraying
        • Invoke-Bruteforce
        • SharpSpray
      • Object Permissions
      • Privileged Groups
      • Group Policy
      • Kerberos
      • AD CS
      • MS SQL Servers
      • SCCM
      • Credential Theft
      • LAPS
      • Forest & Domain Trusts
      • Domain Dominance
      • User Impersonation
      • Lateral Movement
      • Relaying
      • Pivoting
      • Zerologon
      • BloodyAD
      • Expired Passwords
    • Infrastructure
    • OSEP: Checklist
    • AV Evasion
    • UAC Bypass
    • Applocker
    • Initial compromise
    • Privilege Escalation
    • Persistence
    • Data Protection API
    • Windows Script Host
    • Cobalt Strike
    • MetaSploit
    • Linux
    • macOS
    • SQLMap
    • Regex / sed
    • Cracking
    • Misc.
    • Visual Studio notes
  • Generic
    • Commands
    • Web
    • Fixing Errors
Powered by GitBook
On this page
  1. Offensive security
  2. Active Directory
  3. Domain Recon

SharpSpray

LogoObfuscatedSharpCollection/NetFramework_4.7_Any/SharpSpray.exe._obf.exe at main · Flangvik/ObfuscatedSharpCollectionGitHub
LogoGitHub - jnqpblc/SharpSpray: SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt Strike.GitHub

Last updated 8 months ago

.\spray.exe --Passwords Welkom01! --Delay 250