akamai / Invoke-DHCPCheckupView external linksLinks
☆110Feb 13, 2024Updated 2 years ago
Alternatives and similar repositories for Invoke-DHCPCheckup
Users that are interested in Invoke-DHCPCheckup are comparing it to the libraries listed below
Sorting:
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆134Apr 12, 2024Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆358Dec 13, 2025Updated 2 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Nov 18, 2024Updated last year
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- Leak NTLM via Website tab in teams via MS Office☆78Mar 28, 2024Updated last year
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated 11 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 4 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆886Updated this week
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 2 years ago
- Some scripts to abuse kerberos using Powershell☆355Jul 27, 2023Updated 2 years ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆273Dec 27, 2024Updated last year
- ☆79Sep 8, 2025Updated 5 months ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 10 months ago
- Lateral Movement☆125Nov 14, 2023Updated 2 years ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆171May 13, 2024Updated last year
- ☆27May 1, 2023Updated 2 years ago
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,431Jan 5, 2026Updated last month
- ScriptSentry finds misconfigured and dangerous logon scripts.☆622Dec 20, 2024Updated last year
- ☆201Jun 10, 2025Updated 8 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181May 19, 2025Updated 8 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆318Mar 27, 2025Updated 10 months ago
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated last year
- ☆168Feb 29, 2024Updated last year
- Tool for MSSQL relay audit and abuse☆57Dec 17, 2024Updated last year
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Nov 5, 2025Updated 3 months ago
- ☆44Feb 6, 2025Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆157Feb 11, 2025Updated last year
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆35Feb 4, 2023Updated 3 years ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,471Jan 23, 2026Updated 3 weeks ago
- ☆378Oct 17, 2025Updated 3 months ago
- ☆18Jun 4, 2025Updated 8 months ago
- ☆65Mar 15, 2024Updated last year
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated 11 months ago
- Bash and ZSH integration for Impacket☆73Nov 6, 2025Updated 3 months ago