DomainPasswordSpray
MIT馃敟 Offensive Ops 路 PowerShell
DomainPasswordSpray is a PowerShell tool that performs password spray attacks against Active Directory domain user accounts. Unlike credential stuffing which tries many passwords against one account, password spraying tries one password against all accounts to avoid lockout policies. The tool automatically enumerates domain users, respects account lockout thresholds and observation windows, and can target specific organizational units or groups. It outputs successful credentials and supports custom password lists. Lockout-aware design makes it safer than manual spraying approaches.
Installation
$ git clone https://github.com/dafthack/DomainPasswordSpray.gitUse Cases
- Password spraying against AD accounts without triggering lockouts
- Initial access via weak domain passwords
- Testing password policy enforcement
- Targeted spraying against specific OUs or groups
Tags
Details
- Category
- 馃敟 Offensive Ops
- Language
- PowerShell
- Repository
- dafthack/DomainPasswordSpray
- License
- MIT
- Platforms
- 馃獰windows
Links
Used in 1 Workflow
Community Reviews
Alternatives & Comparisons
THC Hydra
CFast online password brute-forcer. Supports 50+ protocols including SSH, FTP, HTTP, SMB, MySQL.
Compare DomainPasswordSpray vs THC HydraCrackMapExec
PythonSwiss army knife for pentesting Active Directory. SMB, LDAP, MSSQL, WinRM enumeration and exploitation.
Compare DomainPasswordSpray vs CrackMapExecMore in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.