Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database
☆258Nov 3, 2025Updated 5 months ago
Alternatives and similar repositories for DonPwner
Users that are interested in DonPwner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Living of the Land of Free SaaS☆70Mar 22, 2026Updated 3 weeks ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 5 months ago
- dcsync bof☆50Feb 13, 2026Updated 2 months ago
- ☆59Dec 10, 2025Updated 4 months ago
- ☆62Feb 12, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 3 months ago
- A C# utility for interacting with SCOM☆98Dec 2, 2025Updated 4 months ago
- ☆138Nov 17, 2025Updated 4 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated last month
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆291Mar 29, 2026Updated 2 weeks ago
- PowerShell & Python tools developed for CTFs and certification exams☆71Aug 10, 2025Updated 8 months ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆279Feb 5, 2026Updated 2 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆657Jan 16, 2026Updated 3 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 4 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆150Dec 6, 2025Updated 4 months ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 3 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆133Oct 4, 2024Updated last year
- Impacket☆50Feb 25, 2026Updated last month
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 9 months ago
- SCEP request tool for AD CS and Intune☆75Oct 24, 2025Updated 5 months ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆14Jan 18, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆330Oct 20, 2025Updated 5 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆45Nov 19, 2025Updated 4 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆59Dec 4, 2025Updated 4 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆65Mar 27, 2026Updated 2 weeks ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆85Apr 2, 2025Updated last year
- Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. Based on the original GodPotato PoC by …☆154Updated this week
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Dump Kerberos tickets from the KCM database of SSSD☆57Dec 31, 2025Updated 3 months ago
- ☆97Jul 10, 2025Updated 9 months ago
- ☆120May 29, 2025Updated 10 months ago
- Active Directory information dumper via ADWS for evasion purposes.☆217Feb 23, 2026Updated last month
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆192Apr 26, 2025Updated 11 months ago
- sl0ppy-PrivescTaskCreator.ps1☆41Oct 8, 2025Updated 6 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆349Jun 2, 2025Updated 10 months ago