Monitor changes in Active Directory with replication metadata
☆91Jul 9, 2024Updated last year
Alternatives and similar repositories for ADSpider
Users that are interested in ADSpider are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC for CVE-2024-3183 (FreeIPA Rosting)☆27Aug 20, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆640May 8, 2025Updated 10 months ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆78Jun 11, 2024Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆265Nov 22, 2025Updated 4 months ago
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server☆38Jul 6, 2024Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- Execute commands in other Sessions☆91Jul 29, 2024Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆86Oct 18, 2024Updated last year
- A PowerShell wrapper for certutil.exe☆20Updated this week
- Tools for interacting with authentication packages using their individual message protocols☆419Mar 1, 2026Updated 3 weeks ago
- Hide your P/Invoke signatures through other people's signed assemblies☆211Mar 10, 2024Updated 2 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆47Sep 18, 2025Updated 6 months ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆554Nov 23, 2025Updated 4 months ago
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- ☆163Sep 26, 2023Updated 2 years ago
- myADMonitor is an open-source Active Directory changes tracking tool☆217Oct 16, 2025Updated 5 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆361Dec 13, 2025Updated 3 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆77Jul 31, 2024Updated last year
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆337Aug 7, 2024Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆320Mar 27, 2025Updated 11 months ago
- Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!☆910Oct 30, 2025Updated 4 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆207Jan 12, 2025Updated last year
- ☆168Feb 29, 2024Updated 2 years ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆260Aug 13, 2024Updated last year
- A BloodHound collector for Microsoft Configuration Manager☆393Jul 7, 2025Updated 8 months ago
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- Execute commands, in/exfiltrate files using your custom RPC Server☆66Jan 13, 2026Updated 2 months ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆444Jul 8, 2024Updated last year
- An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers☆41Updated this week
- ☆136Feb 11, 2025Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆391Jan 20, 2026Updated 2 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,024Feb 1, 2026Updated last month
- ☆143May 22, 2024Updated last year