Exhaustive search and flexible filtering of Active Directory ACEs.
☆77Nov 10, 2025Updated 4 months ago
Alternatives and similar repositories for DACLSearch
Users that are interested in DACLSearch are comparing it to the libraries listed below
Sorting:
- Local SYSTEM auth trigger for relaying☆170Jul 22, 2025Updated 8 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆167Nov 2, 2025Updated 4 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 6 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- A tool that supports finding and abusing whitelisted programs to allow arbitrary file writing into the executable folder of Antivirus sof…☆82Nov 1, 2025Updated 4 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Protect your Domain Controllers by auditing and restricting LDAP requests☆180May 29, 2025Updated 9 months ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆129Nov 17, 2025Updated 4 months ago
- ☆20Sep 6, 2025Updated 6 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆70Feb 17, 2026Updated last month
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- ACL Viewer for Windows☆133May 4, 2025Updated 10 months ago
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated 2 weeks ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated last month
- Comprehensive Windows Syscall Extraction & Analysis Framework☆162Aug 30, 2025Updated 6 months ago
- Proof-of-concept tools for my AD Forest trust research☆236Jun 10, 2024Updated last year
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 7 months ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆27Nov 11, 2020Updated 5 years ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated last month
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆360Jan 8, 2026Updated 2 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆65Jan 5, 2026Updated 2 months ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆58Jan 17, 2026Updated 2 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 5 months ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆121Dec 23, 2025Updated 2 months ago
- ☆31May 16, 2024Updated last year
- A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, wit…☆282Feb 21, 2026Updated last month
- ☆15Jan 26, 2023Updated 3 years ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆99Dec 23, 2025Updated 2 months ago
- ☆16Feb 23, 2021Updated 5 years ago
- ☆65Mar 15, 2024Updated 2 years ago
- A security checking tool☆110Feb 4, 2026Updated last month
- Enumerate your Kubernetes cluster with just 1 command☆11Mar 11, 2026Updated last week
- The home of the SDDLMaker☆28Jan 13, 2025Updated last year
- Generate and Manage KeyCredentialLinks☆253Mar 9, 2026Updated last week
- poc for cve-2025-53772☆46Dec 10, 2025Updated 3 months ago
- This code silently installs Chrome extensions on Mac, Windows, and Linux☆131Jul 22, 2025Updated 7 months ago