Compiled tools for internal assessments
☆378May 8, 2026Updated last week
Alternatives and similar repositories for offsec-tools
Users that are interested in offsec-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,456May 13, 2026Updated last week
- ☆18Sep 14, 2023Updated 2 years ago
- Offensive Security OSCP+, OSEP, OSWP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA, OSIR, OSTH Exam and Lab Reporting / Note-Taking Tool☆919Oct 6, 2025Updated 7 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,252Apr 24, 2026Updated 3 weeks ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆134Oct 4, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,146Oct 21, 2024Updated last year
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆1,013Oct 15, 2025Updated 7 months ago
- Hack The Box CPTS, CWES, CDSA, CWEE, CAPE, CJCA Exam and Lab Reporting / Note-Taking Tool☆374Apr 2, 2026Updated last month
- A Python based ingestor for BloodHound☆2,392Oct 24, 2025Updated 6 months ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆174Nov 5, 2024Updated last year
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆444Oct 1, 2025Updated 7 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Jan 24, 2024Updated 2 years ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆401Jul 23, 2025Updated 9 months ago
- DPAPI looting remotely and locally in Python☆550Mar 13, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Powershell tool to automate Active Directory enumeration.☆1,312May 7, 2026Updated last week
- .NET/PowerShell/VBA Offensive Security Obfuscator☆523Feb 1, 2024Updated 2 years ago
- Active Directory certificate abuse.☆1,976Mar 30, 2026Updated last month
- The Network Execution Tool☆5,517May 12, 2026Updated last week
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆575Jun 5, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,176Updated this week
- ☆628Feb 5, 2026Updated 3 months ago
- ☆199Aug 28, 2025Updated 8 months ago
- ☆18Mar 26, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,516May 6, 2026Updated 2 weeks ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆487Oct 14, 2022Updated 3 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,602Feb 5, 2026Updated 3 months ago
- LDAP enumeration tool implemented in Python3☆225May 20, 2025Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆3,519Feb 28, 2026Updated 2 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).