GetUserSPNs - Extract Service Principal Names | Online Free DevTools by Hexmos
Extract Service Principal Names (SPNs) with GetUserSPNs from Active Directory. Quickly identify accounts with SPNs set for Kerberos attacks. Free online tool, no registration required.
impacket-GetUserSPNs
This command is an alias of
GetUserSPNs.py.
- View documentation for the original command:
tldr GetUserSPNs.py