Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but for security research and penetration testing! π«
β166Oct 21, 2025Updated 5 months ago
Alternatives and similar repositories for Wonka
Users that are interested in Wonka are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Windows tool that converts LDIF files to BloodHound CEβ31Dec 20, 2025Updated 3 months ago
- a small script to collect information from a management pointβ37Jan 19, 2026Updated 2 months ago
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk readsβ249Oct 30, 2025Updated 5 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, β¦β30Feb 15, 2026Updated last month
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.β148Jul 17, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The DCERPC only printerbug.py versionβ214Oct 30, 2025Updated 5 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offlineβ50Oct 20, 2025Updated 5 months ago
- A simple tool to identify WDS servers in Active Directoryβ32Aug 25, 2025Updated 7 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.β190Jan 11, 2026Updated 3 months ago
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.β132Updated this week
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.β72Oct 22, 2025Updated 5 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagementsβ92Feb 9, 2026Updated 2 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.β33Dec 31, 2025Updated 3 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functionsβ269Apr 8, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easilyβ279Feb 5, 2026Updated 2 months ago
- Python tool to automatically perform SPN-less RBCD attacks.β128Jan 7, 2026Updated 3 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.β150Dec 6, 2025Updated 4 months ago
- Windows protocol library, including SMB and RPC implementations, among others.β708Mar 9, 2026Updated last month
- Abusing Azure services over C2β368Jan 20, 2026Updated 2 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via β¦β153Jan 25, 2026Updated 2 months ago
- Azure Post Exploitation Frameworkβ245Oct 27, 2025Updated 5 months ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)β134Oct 23, 2025Updated 5 months ago
- Elastic Security Labs' malware analysis and reverse engineering libraryβ53Mar 10, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA β¦β166Nov 2, 2025Updated 5 months ago
- Windows Access token manipulation tool made in C#β25Aug 24, 2025Updated 7 months ago
- Proof of concept for Kerberos Armoring abuse.β82Dec 12, 2025Updated 4 months ago
- Red Team tools containerizedβ76Mar 25, 2026Updated 2 weeks ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.β72Dec 15, 2025Updated 4 months ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspectiveβ170Jan 12, 2026Updated 3 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.β262Feb 21, 2025Updated last year
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with itβ136Aug 23, 2025Updated 7 months ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA complianceβ45Aug 2, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A C# tool for extracting information from SCCM PXE boot media.β52Jan 14, 2026Updated 3 months ago
- ForsHopsβ59Mar 25, 2025Updated last year
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registriβ¦β57Updated this week
- Modified version of PEAS client for offensive operationsβ50Nov 1, 2025Updated 5 months ago
- β13Mar 24, 2026Updated 3 weeks ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.β129Jan 28, 2026Updated 2 months ago
- Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.β187Dec 23, 2025Updated 3 months ago