Convenience tool for hashcat
☆121Aug 26, 2025Updated 7 months ago
Alternatives and similar repositories for hashcathelper
Users that are interested in hashcathelper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dump NTDS with golden certificates and UnPAC the hash☆646Mar 20, 2024Updated 2 years ago
- A tool for pointesters to find candies in SharePoint☆282Nov 4, 2022Updated 3 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 6 months ago
- ☆143Oct 31, 2023Updated 2 years ago
- Decrypt Veeam database passwords☆222Dec 8, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆235Oct 8, 2024Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆25Aug 21, 2023Updated 2 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated 2 months ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆189Nov 19, 2025Updated 4 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆95Mar 12, 2026Updated last month
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆303Mar 28, 2026Updated 2 weeks ago
- Identify the attack paths in BloodHound breaking your AD tiering☆327Nov 6, 2022Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆485Jul 9, 2024Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆156Nov 2, 2025Updated 5 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,514Mar 18, 2026Updated 3 weeks ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆381Dec 23, 2025Updated 3 months ago
- A Python POC for CRED1 over SOCKS5☆166Oct 5, 2024Updated last year
- Use ESC1 to perform a makeshift DCSync and dump hashes☆210Nov 2, 2023Updated 2 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- DPAPI looting remotely and locally in Python☆546Mar 13, 2026Updated last month
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆103May 6, 2024Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆364Dec 13, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆430Apr 22, 2025Updated 11 months ago
- ☆166Feb 29, 2024Updated 2 years ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆639May 8, 2025Updated 11 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Jun 9, 2024Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- Tool to remotely dump secrets from the Windows registry☆526Feb 27, 2026Updated last month
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆845Dec 2, 2023Updated 2 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,111Nov 9, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Coerce Windows machines auth via MS-EVEN☆174Jan 17, 2024Updated 2 years ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆558Nov 23, 2025Updated 4 months ago
- ☆200Mar 28, 2025Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆622Jan 2, 2025Updated last year
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,473Aug 18, 2023Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆378Mar 31, 2026Updated 2 weeks ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆269Apr 4, 2025Updated last year