This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)
☆69Mar 17, 2025Updated last year
Alternatives and similar repositories for DCSyncHound
Users that are interested in DCSyncHound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Terms of Use Conditional Access M365 Evilginx Phishlet☆45Jun 23, 2025Updated 9 months ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Rainbow table generation & lookup tools.☆34Dec 17, 2025Updated 3 months ago
- Just another ntdll unhooking using Parun's Fart technique☆76Feb 15, 2023Updated 3 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Addon for BHCE☆57Apr 1, 2025Updated last year
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 11 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆300Mar 28, 2026Updated 2 weeks ago
- Weaponizing DCOM for NTLM Authentication Coercions☆205Nov 4, 2025Updated 5 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆296Apr 3, 2026Updated last week
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆346Jun 2, 2025Updated 10 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Info on how to use Kerberos KDC on a non-domain joined host☆54Jul 31, 2024Updated last year
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 9 months ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- ☆17Jan 9, 2025Updated last year
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆175May 13, 2024Updated last year
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 9 months ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆262Feb 21, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- GolenGMSA tool for working with GMSA passwords☆172Aug 21, 2025Updated 7 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆166Dec 7, 2024Updated last year
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated last month
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated last year
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- DFSCoerce exe revisited version with custom authentication☆43Jan 13, 2024Updated 2 years ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 3 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Jun 9, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆658Jan 16, 2026Updated 2 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Reportly is an AzureAD user activity report tool.☆96Aug 14, 2023Updated 2 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 10 months ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- ☆245May 5, 2024Updated last year
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago