This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential Access) with examples. There are multiple ways to perform the same tasks
☆483May 8, 2025Updated 9 months ago
Alternatives and similar repositories for Credential-Dumping
Users that are interested in Credential-Dumping are comparing it to the libraries listed below
Sorting:
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34May 18, 2020Updated 5 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Nov 7, 2020Updated 5 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- ☆140Oct 23, 2022Updated 3 years ago
- ☆348Dec 25, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆48Mar 30, 2021Updated 4 years ago
- This repository contains the files that provide the upload functionality in the IIS Server☆34Aug 4, 2021Updated 4 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆472Oct 23, 2022Updated 3 years ago
- ☆210Oct 23, 2022Updated 3 years ago
- ☆346Oct 23, 2022Updated 3 years ago
- Notes only☆19May 2, 2022Updated 3 years ago
- This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machine…☆862Oct 23, 2022Updated 3 years ago
- ☆248Oct 23, 2022Updated 3 years ago
- This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."☆724Jun 24, 2025Updated 8 months ago
- ☆439Oct 23, 2022Updated 3 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,542Feb 11, 2023Updated 3 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on…☆1,201Oct 23, 2022Updated 3 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,462Nov 16, 2024Updated last year
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficu…☆1,717Mar 24, 2023Updated 2 years ago
- Tools & Interesting Things for RedTeam Ops☆2,256Feb 10, 2026Updated 3 weeks ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆278Jan 14, 2023Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,696Jul 6, 2025Updated 7 months ago
- LDAP library for auditing MS AD☆486Feb 11, 2026Updated 2 weeks ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Updated this week
- ☆413Dec 14, 2023Updated 2 years ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,402Feb 24, 2023Updated 3 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,257Apr 12, 2024Updated last year
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Oct 27, 2023Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆864Mar 20, 2023Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆421May 21, 2022Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,498Jan 18, 2026Updated last month
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 5 months ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆203Jul 14, 2021Updated 4 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,644Aug 28, 2025Updated 6 months ago
- A proof-of-concept Remote Desktop (RDP) session hijack utility☆500Nov 28, 2024Updated last year
- Some usefull Scripts and Executables for Pentest & Forensics☆1,152Dec 11, 2025Updated 2 months ago