Check robustness of your (their) Active Directory accounts passwords
☆45Mar 13, 2026Updated 2 weeks ago
Alternatives and similar repositories for Lestat
Users that are interested in Lestat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆51Nov 2, 2025Updated 4 months ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated 2 months ago
- Azure apim mini proxy☆54Feb 16, 2026Updated last month
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆80Mar 13, 2026Updated 2 weeks ago
- WSUS Unauthenticated RCE☆170Oct 28, 2025Updated 4 months ago
- ☆43Dec 24, 2025Updated 3 months ago
- Issues to consider when planning a red team exercise.☆15Aug 22, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- medor is an OSINT tool that enables you to discover a WordPress website IP behind a WAF or behind Onion Services.☆18Jul 6, 2024Updated last year
- ☆45Feb 6, 2025Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- ☆19Sep 1, 2025Updated 6 months ago
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆50Feb 23, 2026Updated last month
- kerberos in rust for fun and profit☆66Mar 13, 2026Updated last week
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆46Feb 24, 2026Updated last month
- Creating a Bind Shell in C☆20Aug 21, 2023Updated 2 years ago
- ☆27Aug 5, 2025Updated 7 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆362Dec 13, 2025Updated 3 months ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆42Feb 6, 2026Updated last month
- ☆37Jun 27, 2020Updated 5 years ago
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 2 months ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Nov 6, 2023Updated 2 years ago
- Spring Framework RCE (Quick pentest notes)☆17Apr 7, 2022Updated 3 years ago