☆57Nov 18, 2025Updated 5 months ago
Alternatives and similar repositories for AD-Ghost
Users that are interested in AD-Ghost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A scanner for the FortiNet vulnerability CVE-2025-64446☆31Nov 18, 2025Updated 5 months ago
- A C# tool for extracting information from SCCM PXE boot media.☆52Jan 14, 2026Updated 3 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆21Jul 15, 2025Updated 9 months ago
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆75Mar 27, 2026Updated last month
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 7 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 2 months ago
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆85Nov 15, 2025Updated 5 months ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 4 months ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 7 months ago
- Some stuff for PHD2021☆14May 21, 2025Updated 11 months ago
- PowerShell module to manage domain controllers & initial domain deployments☆13Oct 31, 2025Updated 6 months ago
- A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, wit…☆296Feb 21, 2026Updated 2 months ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Brute Ratel External C2 (Microsoft Teams)☆38Dec 11, 2024Updated last year
- ☆164May 5, 2025Updated 11 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads☆253Oct 30, 2025Updated 6 months ago
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 8 months ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆46Aug 10, 2025Updated 8 months ago
- A small WinRM client designed for interacting with JEA endpoints.☆15Aug 29, 2024Updated last year
- WMI Explorer☆103Jan 5, 2026Updated 3 months ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Offensive web scanner: crawling, XSS, SQLi, headers and WAF bypass☆13Apr 20, 2026Updated 2 weeks ago
- ☆50Jun 6, 2025Updated 10 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆148Jul 17, 2025Updated 9 months ago
- Creating an ATT&CK Navigator layer with the detection coverage of the signals available within Tanium Threat Response.☆12Jun 2, 2021Updated 4 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆64Jan 2, 2025Updated last year
- ☆80Jan 1, 2026Updated 4 months ago
- Stealthy .NET assembly loading using AssemblyNative::LoadFromBuffer☆56Mar 22, 2026Updated last month
- Dump LSASS via physical memory read primitives in vulnerable kernel drivers☆322Feb 2, 2026Updated 3 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 4 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- X9 a tool to create URLs with many parameter☆29Feb 8, 2026Updated 2 months ago
- A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and sta…☆203Mar 15, 2026Updated last month
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 7 months ago
- Windows protocol library, including SMB and RPC implementations, among others.☆772Apr 14, 2026Updated 2 weeks ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago