ImpostorKeanu / eavesarp-ngView external linksLinks
☆42Jun 1, 2025Updated 8 months ago
Alternatives and similar repositories for eavesarp-ng
Users that are interested in eavesarp-ng are comparing it to the libraries listed below
Sorting:
- ☆106Updated this week
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆47Oct 4, 2025Updated 4 months ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated 11 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆197Nov 4, 2025Updated 3 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆94Jul 3, 2025Updated 7 months ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Mar 22, 2025Updated 10 months ago
- Deploy a phishing infrastructure on the fly.☆77Dec 21, 2024Updated last year
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 3 months ago
- top usernames from azure survey 2025☆14Apr 25, 2025Updated 9 months ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Apr 10, 2023Updated 2 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- Enumerate Domain Users Without Authentication☆281Apr 22, 2025Updated 9 months ago
- The Azure Execution Tool☆121Feb 6, 2026Updated last week
- pysnaffler☆110Jan 6, 2026Updated last month
- ☆118Nov 21, 2024Updated last year
- A different approach to writing BOFs in rust.☆18Aug 20, 2025Updated 5 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆273Dec 27, 2024Updated last year
- ☆88Jul 28, 2022Updated 3 years ago
- A Model Context Protocol server for IDA☆27Mar 25, 2025Updated 10 months ago
- PAM Backdoor☆32Mar 29, 2023Updated 2 years ago
- ☆47Dec 5, 2025Updated 2 months ago
- Find jmp gadgets for call stack spoofing.☆75Oct 1, 2025Updated 4 months ago
- A PowerShell console in C/C++ with all the security features disabled☆342Oct 14, 2025Updated 4 months ago
- ☆216Mar 26, 2024Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆282Jun 15, 2024Updated last year
- A C# implementation of dumping credentials from Windows Credential Manager☆61Sep 23, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆302Jan 20, 2026Updated 3 weeks ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- Red Team Collaboration Infrastructure☆98Apr 24, 2025Updated 9 months ago
- Execute shellcode via ASPNET compiler☆61Oct 2, 2025Updated 4 months ago
- ☆39Mar 28, 2025Updated 10 months ago
- ☆159May 5, 2025Updated 9 months ago
- Canary Detection☆188Oct 20, 2025Updated 3 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆260Feb 21, 2025Updated 11 months ago
- Tools for interacting with authentication packages using their individual message protocols☆368Feb 1, 2026Updated 2 weeks ago
- fully async implementation of Dirkjan's ROADTools☆34Mar 15, 2025Updated 11 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆73Nov 6, 2025Updated 3 months ago