☆44Feb 6, 2025Updated last year
Alternatives and similar repositories for Powershell
Users that are interested in Powershell are comparing it to the libraries listed below
Sorting:
- Impacket is a collection of Python classes for working with network protocols.☆19Nov 13, 2025Updated 3 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated 3 weeks ago
- TokenCert☆102Nov 15, 2024Updated last year
- Say No to CloudFlare☆14Aug 19, 2022Updated 3 years ago
- ☆235Oct 8, 2024Updated last year
- ☆198Mar 28, 2025Updated 11 months ago
- adws enumeration bof☆167Feb 16, 2026Updated last week
- Table of AD and Azure assets and whether they belong to Tier Zero☆258Jan 23, 2026Updated last month
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆361Dec 13, 2025Updated 2 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆238Feb 11, 2025Updated last year
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆358Jan 8, 2026Updated last month
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 7 months ago
- Sniffing files generator☆61Feb 24, 2025Updated last year
- modified mssqlclient from impacket to extract policies from the SCCM database☆44Updated this week
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆266Apr 8, 2025Updated 10 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- ☆137Feb 11, 2025Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆225Nov 23, 2023Updated 2 years ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆155Nov 2, 2025Updated 3 months ago
- ☆159May 5, 2025Updated 9 months ago
- Tools for interacting with authentication packages using their individual message protocols☆403Feb 1, 2026Updated last month
- ☆33Jan 23, 2025Updated last year
- ☆103Sep 5, 2023Updated 2 years ago
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 5 months ago
- ☆237May 19, 2025Updated 9 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆362Jan 29, 2026Updated last month
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Feb 18, 2026Updated last week
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Feb 13, 2022Updated 4 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- Continuous password spraying tool☆201Dec 4, 2025Updated 2 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆461Aug 17, 2024Updated last year
- Most Responder's configuration power in your hand.☆54Jan 19, 2025Updated last year
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- Assess the security of your Active Directory with few or all privileges.☆345Updated this week