A TUI for Active Directory collection.
☆132Mar 17, 2026Updated this week
Alternatives and similar repositories for flashingestor
Users that are interested in flashingestor are comparing it to the libraries listed below
Sorting:
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- ☆17Jan 9, 2025Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 5 months ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 7 months ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆192Feb 11, 2026Updated last month
- Commandline spoofing on Windows☆94Nov 25, 2025Updated 3 months ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 3 months ago
- MSIX Building Made Easy for Defenders☆64Aug 25, 2025Updated 6 months ago
- Network Fuzzing Framework☆64Jan 17, 2026Updated 2 months ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆134Oct 23, 2025Updated 4 months ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆24Feb 23, 2026Updated 3 weeks ago
- Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration☆90Updated this week
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 6 months ago
- Active Directory Authentication Library☆90Nov 7, 2025Updated 4 months ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- MDE/MDI Defender setup for Ludus☆54Mar 14, 2026Updated last week
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆36Feb 16, 2026Updated last month
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆48Oct 4, 2025Updated 5 months ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- ForsHops☆59Mar 25, 2025Updated 11 months ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interact…☆52Oct 16, 2025Updated 5 months ago
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆68Dec 15, 2025Updated 3 months ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆31Sep 17, 2025Updated 6 months ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Jun 6, 2022Updated 3 years ago
- Phantom is project created to perform loading and executing .NET assemblies directly in memory within an IIS environment running in full‑…☆68Mar 10, 2026Updated last week
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆326Oct 20, 2025Updated 5 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆898Mar 11, 2026Updated last week