☆47Jun 1, 2025Updated 11 months ago
Alternatives and similar repositories for eavesarp-ng
Users that are interested in eavesarp-ng are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆79Mar 7, 2026Updated 2 months ago
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆49Oct 4, 2025Updated 7 months ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Weaponizing DCOM for NTLM Authentication Coercions☆210Nov 4, 2025Updated 6 months ago
- ☆90Jul 28, 2022Updated 3 years ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 10 months ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Jun 17, 2024Updated last year
- Deploy a phishing infrastructure on the fly.☆78Dec 21, 2024Updated last year
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Mar 22, 2025Updated last year
- Azure Post Exploitation Framework☆246Oct 27, 2025Updated 6 months ago
- ☆221Mar 26, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A PowerShell console in C/C++ with all the security features disabled☆386Oct 14, 2025Updated 6 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆308Mar 28, 2026Updated last month
- PAM Backdoor☆33Mar 29, 2023Updated 3 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆33Jan 22, 2026Updated 3 months ago
- top usernames from azure survey 2025☆16Apr 25, 2025Updated last year
- Enumerate Domain Users Without Authentication☆287Apr 22, 2025Updated last year
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- ☆122Nov 21, 2024Updated last year
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆160Feb 14, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆39Mar 28, 2025Updated last year
- A Python POC for CRED1 over SOCKS5☆166Oct 5, 2024Updated last year
- pysnaffler☆111Jan 6, 2026Updated 4 months ago
- fully async implementation of Dirkjan's ROADTools☆34Mar 15, 2025Updated last year
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆265Feb 21, 2025Updated last year
- ☆164May 5, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆304Jan 20, 2026Updated 3 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆22Nov 19, 2025Updated 5 months ago
- ☆109Oct 29, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆281Jun 15, 2024Updated last year
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆595Mar 19, 2024Updated 2 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated last year
- Researching vulnerabilities with iOS Shortcuts.☆15Apr 15, 2025Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆172Nov 26, 2023Updated 2 years ago