Ldsview is a offline search tool for LDAP directory dumps in LDIF format.
Features
ldapsearch
commands to extract an LDIF from a directoryConfig
Config options can be passed as CLI flags, environment variables, or via a config file courtsey of viper. Reference the project’s documentation for all of the different ways you can supply configuration.
ldsview
will look for a file called .ldsview.{json,toml,yaml}
in the user’s home directoryLDSVIEW
will be read in by the application.Usage
Detailed usage information is available via the --help
flag or the help
command for ldsview
and all subcommands.
Search Syntax
ldsview
‘s search mechanism is based on the entityfilter project. Detailed information about search filter syntax can be found in that project’s README.
Examples
ldapsearch
command to extract LDIF files from a directory: ldsview cmdbuilder
ldsview -f myfile.ldif entity myuser
ldsview uac 532480
ldsview -f myfile.ldif search "adminCount:=1,sAMAccountName:!=krbtgt"
adminCount
of 1 that are not krbtgt
-i
can be used to limit which attributes are returned from matching entities--tdc
will translate directory timestamps into a human readable formatTools Directory
Additional tools and utilities for managing LDIFs:
Makefile: Place the Makefile in the same directory as your exported LDIF and run make.
>>make -j9 LDIF=./my.domain.ldif
This will split and create the following default LDIFs:
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…