Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.
☆72Dec 15, 2025Updated 4 months ago
Alternatives and similar repositories for LDAP-Bof-Collection
Users that are interested in LDAP-Bof-Collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 11 months ago
- Bof of RegPwn by MDSec☆117Mar 15, 2026Updated last month
- adws enumeration bof☆170Feb 16, 2026Updated 2 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 4 months ago
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Exploitation of CVE-2025-29969☆63Feb 20, 2026Updated last month
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 9 months ago
- ☆35Jan 23, 2025Updated last year
- a BOF implementation of various registry persistence methods☆97Nov 11, 2025Updated 5 months ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆67Jun 10, 2025Updated 10 months ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated 2 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆70Mar 6, 2026Updated last month
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 2 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆79Oct 27, 2025Updated 5 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 2 months ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆29Jun 17, 2022Updated 3 years ago
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 6 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆117Dec 21, 2025Updated 3 months ago
- ☆52May 4, 2025Updated 11 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated last year
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆33Oct 22, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CVE-2024-35250 的 Beacon Object File (BOF) 实现。☆24Nov 28, 2024Updated last year
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- An example of COM hijacking using a proxy DLL.☆43Aug 17, 2021Updated 4 years ago
- ☆147Nov 6, 2025Updated 5 months ago
- UDC2 implementation that provides an ICMP C2 channel☆120Nov 24, 2025Updated 4 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆103Jul 9, 2025Updated 9 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆162Jan 3, 2026Updated 3 months ago
- An Ansible collection that installs an SCCM deployment with optional configurations.☆105Dec 8, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Bring runZero Exposure Management into BloodHound☆46Mar 14, 2026Updated last month
- Run Cobalt Strike BOFs in Brute Ratel C4!☆87Apr 15, 2025Updated last year
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆560Nov 23, 2025Updated 4 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆156Nov 2, 2025Updated 5 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆166Oct 21, 2025Updated 5 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆59Dec 4, 2025Updated 4 months ago