Access All Networks: an offensive multitool against 802.1X
☆20Aug 25, 2025Updated 6 months ago
Alternatives and similar repositories for AAN
Users that are interested in AAN are comparing it to the libraries listed below
Sorting:
- AES-256-CBC: A header-only library for AES encryption and decryption. Securely protect your data with this easy-to-integrate, single-head…☆12May 16, 2024Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- A Windows PE loader / manual mapper for executables (x86 and x64) with full TLS (Thread Local Storage) support.☆88Oct 27, 2025Updated 4 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆119Jun 10, 2025Updated 8 months ago
- ☆12May 6, 2021Updated 4 years ago
- ☆20Sep 6, 2025Updated 6 months ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 7 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated last month
- ☆10May 29, 2023Updated 2 years ago
- ☆14Aug 15, 2023Updated 2 years ago
- I want to say please and thank you to Claude, but I don't want to waste tokens on it.☆27Feb 18, 2026Updated 2 weeks ago
- Obtenir un observateur☆12Dec 14, 2025Updated 2 months ago
- ☆18Jan 26, 2026Updated last month
- ☆37Feb 12, 2026Updated 3 weeks ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆359Jan 8, 2026Updated 2 months ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆165Jan 23, 2026Updated last month
- Due to changes in packaging, virtio installers provided by CentOS/RHEL are no longer Authenticode signed. This project is archived.☆14Nov 10, 2023Updated 2 years ago
- ☆13May 21, 2025Updated 9 months ago
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated last week
- D/Invoke standalone shellcode runners☆40Nov 23, 2023Updated 2 years ago
- Aruba AOS8, InfluxDB and Grafana: How to create your own dashboard☆11Aug 4, 2019Updated 6 years ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆150Sep 4, 2025Updated 6 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated last month
- One WSL BOF to rule them all☆159Jan 14, 2026Updated last month
- A quick python script to analyze a given set of passwords and give you some statistics. Used for identifying the most effective hashcat r…☆18Aug 24, 2017Updated 8 years ago
- Docker images of the Exegol project☆130Mar 3, 2026Updated last week
- ☆16May 29, 2024Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Deception implementation through analysis of BloodHound data☆53Oct 9, 2025Updated 5 months ago
- A simple PHP library for reading and manipulating the /etc/network/interfaces file in Debian based distributions.☆11Jul 25, 2019Updated 6 years ago
- A cross-platform tool to work with Security Identifiers (SID) formats.☆15Jun 21, 2025Updated 8 months ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- Decrypt SCCM and DPAPI secrets with Powershell.☆45Jun 24, 2025Updated 8 months ago
- ☆18Feb 29, 2024Updated 2 years ago
- Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071☆20Nov 5, 2025Updated 4 months ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆42Dec 30, 2025Updated 2 months ago