☆45Feb 6, 2025Updated last year
Alternatives and similar repositories for Powershell
Users that are interested in Powershell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- Impacket is a collection of Python classes for working with network protocols.☆20Nov 13, 2025Updated 4 months ago
- Say No to CloudFlare☆14Aug 19, 2022Updated 3 years ago
- TokenCert☆102Nov 15, 2024Updated last year
- adws enumeration bof☆169Feb 16, 2026Updated last month
- ☆234Oct 8, 2024Updated last year
- Sniffing files generator☆62Feb 24, 2025Updated last year
- Table of AD and Azure assets and whether they belong to Tier Zero☆259Mar 2, 2026Updated 3 weeks ago
- ☆198Mar 28, 2025Updated 11 months ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆361Dec 13, 2025Updated 3 months ago
- Continuous password spraying tool☆204Mar 12, 2026Updated last week
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆360Jan 8, 2026Updated 2 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- A PowerShell wrapper for certutil.exe☆20Updated this week
- ☆33Jan 23, 2025Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆80Nov 18, 2024Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆268Apr 8, 2025Updated 11 months ago
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Decrypt SCCM and DPAPI secrets with Powershell.☆45Jun 24, 2025Updated 9 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆241Feb 11, 2025Updated last year
- Tools for interacting with authentication packages using their individual message protocols☆419Mar 1, 2026Updated 3 weeks ago
- ☆17Jul 16, 2024Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆226Nov 23, 2023Updated 2 years ago
- ☆136Feb 11, 2025Updated last year
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆465Aug 17, 2024Updated last year
- modified mssqlclient from impacket to extract policies from the SCCM database☆46Feb 24, 2026Updated last month
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 6 months ago
- Assess the security of your Active Directory with few or all privileges.☆360Mar 16, 2026Updated last week
- ☆104Sep 5, 2023Updated 2 years ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆156Nov 2, 2025Updated 4 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆103May 6, 2024Updated last year
- 强制认证扫描与利用☆12Jul 21, 2023Updated 2 years ago
- ☆127Jan 23, 2025Updated last year