PowerShell implementation for AD CS
☆70Feb 19, 2026Updated last week
Alternatives and similar repositories for LOLADCS
Users that are interested in LOLADCS are comparing it to the libraries listed below
Sorting:
- Dump processes over WMI with MSFT_MTProcess☆84Feb 13, 2026Updated 2 weeks ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 7 months ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆42Dec 30, 2025Updated 2 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆144Feb 16, 2026Updated last week
- Python based GUI for browsing LDAP☆180Dec 7, 2025Updated 2 months ago
- A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, wit…☆145Updated this week
- Pseudo-shell for RCE scenarios: tunnels commands via /tmp sockets to a local daemon, keeps context, no bind or reverse shell needed.☆43Jun 12, 2025Updated 8 months ago
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 6 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆63Dec 25, 2025Updated 2 months ago
- Client-side Encrypted Upload Server Python Script☆66Jul 10, 2025Updated 7 months ago
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 7 months ago
- ☆48Dec 21, 2025Updated 2 months ago
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆193Dec 17, 2025Updated 2 months ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆58Dec 15, 2025Updated 2 months ago
- Beacon Object Files (BOF) for Cobalt Strike.☆32Aug 23, 2024Updated last year
- ☆41Feb 20, 2025Updated last year
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆186Jan 11, 2026Updated last month
- A small How-To on creating your own weaponized WSL file☆121Jul 23, 2025Updated 7 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆138Jul 2, 2025Updated 7 months ago
- Commandline spoofing on Windows☆94Nov 25, 2025Updated 3 months ago
- Mythic C2 Agent written in x64 PIC C☆85Jan 29, 2025Updated last year
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆106Feb 16, 2026Updated last week
- Python tool to automatically perform SPN-less RBCD attacks.☆120Jan 7, 2026Updated last month
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆104Jan 26, 2026Updated last month
- Random BOFs for LDAP tradecraft☆73Sep 9, 2025Updated 5 months ago
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆258Updated this week
- This C# tool sprays for admin access over the entire domain☆88Dec 7, 2025Updated 2 months ago
- A community-driven collection of BloodHound queries☆171Feb 17, 2026Updated last week
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆400Jan 14, 2026Updated last month
- Exploit for the CVE-2024-5806☆45Jun 24, 2024Updated last year
- Aliasr is a modern, feature-rich TUI launcher for penetration testing commands inspired by Arsenal, but with significantly improved funct…☆96Jan 26, 2026Updated last month
- An example reference design for a proposed BOF PE☆197Jan 23, 2026Updated last month
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆275Dec 27, 2024Updated last year
- ☆10Jul 1, 2023Updated 2 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago