☆43Jun 1, 2025Updated 9 months ago
Alternatives and similar repositories for eavesarp-ng
Users that are interested in eavesarp-ng are comparing it to the libraries listed below
Sorting:
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆48Oct 4, 2025Updated 5 months ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated 11 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆198Nov 4, 2025Updated 4 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆143Feb 14, 2026Updated 3 weeks ago
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Mar 22, 2025Updated 11 months ago
- Deploy a phishing infrastructure on the fly.☆77Dec 21, 2024Updated last year
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Apr 10, 2023Updated 2 years ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 10 months ago
- pysnaffler☆110Jan 6, 2026Updated 2 months ago
- ☆121Nov 21, 2024Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- ☆88Jul 28, 2022Updated 3 years ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- A Model Context Protocol server for IDA☆27Mar 25, 2025Updated 11 months ago
- PAM Backdoor☆32Mar 29, 2023Updated 2 years ago
- Find jmp gadgets for call stack spoofing.☆75Oct 1, 2025Updated 5 months ago
- ☆215Mar 26, 2024Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆283Jun 15, 2024Updated last year
- The Azure Execution Tool☆135Feb 6, 2026Updated last month
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- A PowerShell console in C/C++ with all the security features disabled☆368Oct 14, 2025Updated 4 months ago
- ☆48Dec 5, 2025Updated 3 months ago
- A different approach to writing BOFs in rust.☆19Aug 20, 2025Updated 6 months ago
- Red Team Collaboration Infrastructure☆98Apr 24, 2025Updated 10 months ago
- Impacket is a collection of Python classes for working with network protocols.☆303Jan 20, 2026Updated last month
- ☆38Mar 28, 2025Updated 11 months ago
- Execute shellcode via ASPNET compiler☆62Oct 2, 2025Updated 5 months ago
- ☆160May 5, 2025Updated 10 months ago
- Canary Detection☆190Oct 20, 2025Updated 4 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆261Feb 21, 2025Updated last year
- fully async implementation of Dirkjan's ROADTools☆34Mar 15, 2025Updated 11 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago