Nullbinder
Tools to exploit misconfiguration into LDAP directory
Install / Use
/learn @gfrancqu/NullbinderREADME
nullbinder
this tools allow you to exploit and extract informations from misconfigured LDAP directory that allow null bind and null based searches
installation
virtualenv venv
source venv/bin/activate
pip install python-ldap
usage
usage: nullbinder.py [-h] [--host HOST] [--port PORT] [--host-file HOST_FILE]
out
Test an LDAP server for null bind, base dn, and dump the content.
positional arguments:
out output directory, will be created if doesn't exist
optional arguments:
-h, --help show this help message and exit
--host HOST host to scan (default: None)
--port PORT which port the ldap server is listenning on (default
to 389) (default: 389)
--host-file HOST_FILE
provide a file containing list of host in the form
host:port (default: None)
Pull request are welcome !
Related Skills
healthcheck
345.4kHost security hardening and risk-tolerance configuration for OpenClaw deployments
node-connect
345.4kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
prose
345.4kOpenProse VM skill pack. Activate on any `prose` command, .prose files, or OpenProse mentions; orchestrates multi-agent workflows.
frontend-design
104.6kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
