This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential Access) with examples. There are multiple ways to perform the same tasks
☆496Mar 14, 2026Updated last month
Alternatives and similar repositories for Credential-Dumping
Users that are interested in Credential-Dumping are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆36May 18, 2020Updated 5 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆86Nov 7, 2020Updated 5 years ago
- ☆157Mar 14, 2026Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆51Mar 30, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆363Mar 14, 2026Updated last month
- This repository contains the files that provide the upload functionality in the IIS Server☆36Aug 4, 2021Updated 4 years ago
- Notes only☆20May 2, 2022Updated 4 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆479Mar 14, 2026Updated last month
- ☆213Mar 14, 2026Updated last month
- ☆355Mar 14, 2026Updated last month
- This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machine…☆882Mar 14, 2026Updated last month
- ☆259Mar 14, 2026Updated last month
- This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."☆759Mar 14, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆443Oct 23, 2022Updated 3 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,590Mar 14, 2026Updated last month
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on…☆1,222Oct 23, 2022Updated 3 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,508Mar 14, 2026Updated last month
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficu…☆1,785Mar 14, 2026Updated last month
- This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.☆831Mar 14, 2026Updated last month
- Tools & Interesting Things for RedTeam Ops☆2,271Feb 10, 2026Updated 2 months ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆485Oct 14, 2022Updated 3 years ago
- ☆27Jun 19, 2025Updated 10 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆412Dec 14, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,733Jul 6, 2025Updated 9 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,175Updated this week
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,442Feb 24, 2023Updated 3 years ago
- LDAP library for auditing MS AD☆494Feb 11, 2026Updated 2 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,596Jan 18, 2026Updated 3 months ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆283Jan 14, 2023Updated 3 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,282Apr 12, 2024Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆874Mar 20, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- "Golden" certificates☆716Aug 17, 2024Updated last year
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆373Dec 24, 2021Updated 4 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,662Aug 28, 2025Updated 8 months ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,838Updated this week
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,642Aug 6, 2022Updated 3 years ago
- A User Impersonation tool - via Token or Shellcode injection☆423May 21, 2022Updated 3 years ago
- Run Powershell without software restrictions.☆282Sep 8, 2021Updated 4 years ago