Compiled tools for internal assessments
☆373Apr 3, 2026Updated this week
Alternatives and similar repositories for offsec-tools
Users that are interested in offsec-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,415Updated this week
- ☆18Sep 14, 2023Updated 2 years ago
- Offensive Security OSCP+, OSEP, OSWP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA, OSIR, OSTH Exam and Lab Reporting / Note-Taking Tool☆910Oct 6, 2025Updated 6 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,220Jan 5, 2026Updated 3 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆133Oct 4, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,138Oct 21, 2024Updated last year
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆995Oct 15, 2025Updated 5 months ago
- Hack The Box CPTS, CWES, CDSA, CWEE, CAPE, CJCA Exam and Lab Reporting / Note-Taking Tool☆356Apr 2, 2026Updated last week
- A Python based ingestor for BloodHound☆2,371Oct 24, 2025Updated 5 months ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆174Nov 5, 2024Updated last year
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆442Oct 1, 2025Updated 6 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Jan 24, 2024Updated 2 years ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 8 months ago
- DPAPI looting remotely and locally in Python☆545Mar 13, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Powershell tool to automate Active Directory enumeration.☆1,292Apr 1, 2026Updated last week
- .NET/PowerShell/VBA Offensive Security Obfuscator☆519Feb 1, 2024Updated 2 years ago
- Active Directory certificate abuse.☆1,943Mar 30, 2026Updated last week
- The Network Execution Tool☆5,393Updated this week
- ☆620Feb 5, 2026Updated 2 months ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆568Jun 5, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,159Mar 8, 2026Updated last month
- ☆199Aug 28, 2025Updated 7 months ago
- ☆18Mar 26, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,493Feb 18, 2026Updated last month
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,571Feb 5, 2026Updated 2 months ago
- LDAP enumeration tool implemented in Python3☆224May 20, 2025Updated 10 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆3,451Feb 28, 2026Updated last month
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆364Dec 13, 2025Updated 3 months ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆131Jan 14, 2023Updated 3 years ago
- A (partial) Python rewriting of PowerSploit's PowerView☆1,107Mar 5, 2026Updated last month
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,836Apr 2, 2026Updated last week
- ☆438Mar 2, 2025Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,448Feb 15, 2026Updated last month
- Tool to remotely dump secrets from the Windows registry☆526Feb 27, 2026Updated last month
- Dominate Active Directory with PowerShell.☆1,174Nov 28, 2025Updated 4 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆401Jan 14, 2026Updated 2 months ago
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆919Oct 15, 2024Updated last year