Access All Networks: an offensive multitool against 802.1X
☆20Aug 25, 2025Updated 7 months ago
Alternatives and similar repositories for AAN
Users that are interested in AAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆360Jan 8, 2026Updated 2 months ago
- CTF challenges WriteUp☆14Jun 27, 2022Updated 3 years ago
- D/Invoke standalone shellcode runners☆40Nov 23, 2023Updated 2 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- Compile SharpHound and others on Linux☆24Aug 16, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Obtenir un observateur☆12Dec 14, 2025Updated 3 months ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- ☆20Sep 6, 2025Updated 6 months ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Jun 29, 2025Updated 9 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆120Jun 10, 2025Updated 9 months ago
- ☆41Feb 12, 2026Updated last month
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated 3 weeks ago
- Filesystem interaction via firebeam virtual machine execution☆42Mar 14, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Windows Active DIrectory Pentesting documentation.☆19Jun 14, 2024Updated last year
- ☆53Oct 29, 2024Updated last year
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆168Jan 23, 2026Updated 2 months ago
- Parses logs created by Cobalt Strike, Brute Ratel, OC2 and creates an SQLite DB which can be used to create custom reports.☆26Mar 18, 2026Updated last week
- ☆10May 29, 2023Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆150Sep 4, 2025Updated 6 months ago
- Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️☆26Jul 22, 2022Updated 3 years ago
- hack3270 is a python3 based tool to manipulate tn3270 data streams, specifically to perform application penetration testing of mainframe …☆24Feb 21, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Windows PE loader / manual mapper for executables (x86 and x64) with full TLS (Thread Local Storage) support.☆92Oct 27, 2025Updated 5 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Jul 2, 2024Updated last year
- AES-256-CBC: A header-only library for AES encryption and decryption. Securely protect your data with this easy-to-integrate, single-head…☆12May 16, 2024Updated last year
- Docker images of the Exegol project☆131Updated this week
- One WSL BOF to rule them all☆165Jan 14, 2026Updated 2 months ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- ☆14Aug 15, 2023Updated 2 years ago
- I want to say please and thank you to Claude, but I don't want to waste tokens on it.☆27Feb 18, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Due to changes in packaging, virtio installers provided by CentOS/RHEL are no longer Authenticode signed. This project is archived.☆14Nov 10, 2023Updated 2 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- ☆12May 6, 2021Updated 4 years ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆46Dec 30, 2025Updated 3 months ago
- ☆18Mar 15, 2026Updated 2 weeks ago
- Python alternative to Mimikatz lsadump::dcshadow☆161Jun 24, 2025Updated 9 months ago
- Network Fuzzing Framework☆64Jan 17, 2026Updated 2 months ago