This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)
☆68Mar 17, 2025Updated last year
Alternatives and similar repositories for DCSyncHound
Users that are interested in DCSyncHound are comparing it to the libraries listed below
Sorting:
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Rainbow table generation & lookup tools.☆34Dec 17, 2025Updated 3 months ago
- Just another ntdll unhooking using Parun's Fart technique☆76Feb 15, 2023Updated 3 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆201Nov 4, 2025Updated 4 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆343Jun 2, 2025Updated 9 months ago
- Info on how to use Kerberos KDC on a non-domain joined host☆53Jul 31, 2024Updated last year
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- ☆17Jan 9, 2025Updated last year
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆293Mar 13, 2026Updated last week
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆175May 13, 2024Updated last year
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 8 months ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆261Feb 21, 2025Updated last year
- GolenGMSA tool for working with GMSA passwords☆172Aug 21, 2025Updated 7 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆166Dec 7, 2024Updated last year
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated last month
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆657Jan 16, 2026Updated 2 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Jun 9, 2024Updated last year
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- Reportly is an AzureAD user activity report tool.☆96Aug 14, 2023Updated 2 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated 2 years ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year