Crack any Microsoft Windows users password without any privilege (Guest account included)
☆1,158Nov 9, 2023Updated 2 years ago
Alternatives and similar repositories for win-brute-logon
Users that are interested in win-brute-logon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerBruteLogon (Ported version of WinBruteLogon in pure PowerShell)☆124Nov 9, 2023Updated 2 years ago
- RunAsAttached is a program to run a console as another user and keep new console attached to caller console. Support reverse shell mode (…☆76Dec 25, 2022Updated 3 years ago
- This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.☆199Oct 17, 2020Updated 5 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆318Dec 19, 2023Updated 2 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆641Dec 9, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆770Feb 16, 2021Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,174Sep 29, 2021Updated 4 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,662Aug 28, 2025Updated 8 months ago
- Fake Windows logon screen to steal passwords☆1,374Feb 3, 2020Updated 6 years ago
- .NET Project for Attacking vCenter☆559Nov 11, 2021Updated 4 years ago
- RunAsAttached is a program to locally run a new terminal as another user without spawning a new console window.☆47Jan 27, 2022Updated 4 years ago
- Miscellaneous Tools☆269Oct 29, 2020Updated 5 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago
- Self-developed tools for Lateral Movement/Code Execution☆721Aug 17, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- Open source pre-operation C2 server based on python and powershell☆766Jul 6, 2021Updated 4 years ago
- Windows active user credential phishing tool☆284Mar 10, 2020Updated 6 years ago
- ☆1,683Apr 14, 2025Updated last year
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,456Dec 18, 2022Updated 3 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,822Mar 17, 2021Updated 5 years ago
- ☆670Nov 17, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Retrieve LAPS password from LDAP☆442Feb 17, 2021Updated 5 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆442Apr 1, 2022Updated 4 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆823Dec 14, 2023Updated 2 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,443Jul 20, 2024Updated last year
- Evade sysmon and windows event logging☆624Apr 8, 2020Updated 6 years ago
- Open-Source Shellcode & PE Packer☆2,094Feb 3, 2024Updated 2 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆634Aug 15, 2025Updated 8 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A PowerShell script anti-virus evasion tool☆1,185Mar 19, 2023Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆1,552Apr 9, 2026Updated 3 weeks ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆881Mar 29, 2021Updated 5 years ago
- Windows Exploit Suggester - Next Generation☆4,836Apr 23, 2026Updated last week
- Get file less command execution for lateral movement.☆637Jun 3, 2022Updated 3 years ago
- Steal privileged token to obtain SYSTEM shell☆252Jul 14, 2020Updated 5 years ago
- PowerShell ReverseTCP Shell - Framework☆1,064Sep 18, 2022Updated 3 years ago