Credentials gathering tool automating remote procdump and parse of lsass process.
β783Jun 20, 2020Updated 5 years ago
Alternatives and similar repositories for spraykatz
Users that are interested in spraykatz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract credentials from lsass remotelyβ2,184Dec 24, 2025Updated 3 months ago
- Enumerate information from NTLM authentication enabled web endpoints πβ507Sep 23, 2025Updated 6 months ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testersβ809Aug 28, 2022Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Securityβ3,650Aug 28, 2025Updated 6 months ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run commandβ1,610Jul 10, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- gather gather gatherβ583Mar 15, 2025Updated last year
- Mimikatz implementation in pure Pythonβ3,257Jan 2, 2026Updated 2 months ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime patβ¦β880Mar 29, 2021Updated 4 years ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..β744Nov 18, 2020Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registryβ86Mar 9, 2021Updated 5 years ago
- A tool to abuse Exchange servicesβ2,302Jun 10, 2024Updated last year
- β1,674Apr 14, 2025Updated 11 months ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via sockeβ¦β770Feb 16, 2021Updated 5 years ago
- Payload Generation Frameworkβ1,978Aug 21, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- LDAP library for auditing MS ADβ489Feb 11, 2026Updated last month
- Miscellaneous Toolsβ270Oct 29, 2020Updated 5 years ago
- β197Mar 19, 2020Updated 6 years ago
- HTA encryption tool for RedTeamsβ1,422Nov 9, 2022Updated 3 years ago
- Dump stuff without touching diskβ164Oct 29, 2020Updated 5 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.β1,432Jul 20, 2024Updated last year
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficientβ1,559Oct 17, 2022Updated 3 years ago
- β668Nov 17, 2021Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environmentsβ2,168Sep 29, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed overβ¦β383Aug 17, 2018Updated 7 years ago
- A Python based ingestor for BloodHoundβ2,368Oct 24, 2025Updated 5 months ago
- The Shadow Attack Frameworkβ1,117Sep 4, 2022Updated 3 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policiesβ325Apr 8, 2023Updated 2 years ago
- The ultimate WinRM shell for hacking/pentestingβ5,306Mar 10, 2026Updated 2 weeks ago
- SharpSploit is a .NET post-exploitation library written in C#β1,862Aug 12, 2021Updated 4 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.β111Dec 27, 2019Updated 6 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificaβ¦β867Mar 20, 2023Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.β1,452Dec 18, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- β361Apr 24, 2021Updated 4 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLLβsβ331Oct 20, 2019Updated 6 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLRβ2,330Dec 6, 2023Updated 2 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security featuresβ1,310Aug 19, 2019Updated 6 years ago
- β538Nov 20, 2021Updated 4 years ago
- β128May 22, 2023Updated 2 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelistingβ825Nov 15, 2025Updated 4 months ago