Exhaustive search and flexible filtering of Active Directory ACEs.
☆78Nov 10, 2025Updated 6 months ago
Alternatives and similar repositories for DACLSearch
Users that are interested in DACLSearch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local SYSTEM auth trigger for relaying☆171Jul 22, 2025Updated 9 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆168Nov 2, 2025Updated 6 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 8 months ago
- BOF to run PE in Cobalt Strike Beacon without console creation☆199Nov 23, 2025Updated 5 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆83Mar 15, 2026Updated 2 months ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 10 months ago
- A tool that supports finding and abusing whitelisted programs to allow arbitrary file writing into the executable folder of Antivirus sof…☆90May 3, 2026Updated 2 weeks ago
- Havoc C2 BOF port of the KslD.sys BYOVD technique. Credential extraction from lsass via physical memory — no OpenProcess, no auditable AP…☆108Apr 22, 2026Updated 3 weeks ago
- A Windows tool that converts LDIF files to BloodHound CE☆32Dec 20, 2025Updated 5 months ago
- Protect your Domain Controllers by auditing and restricting LDAP requests☆187May 29, 2025Updated 11 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated 2 years ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆132Nov 17, 2025Updated 6 months ago
- ☆24Sep 6, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- ACL Viewer for Windows☆133May 4, 2025Updated last year
- Red Team Coin for crypto-mining operations.☆24Mar 1, 2026Updated 2 months ago
- Living of the Land of Free SaaS☆75Mar 22, 2026Updated last month
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated 3 months ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆83Feb 17, 2026Updated 3 months ago
- Proof-of-concept tools for my AD Forest trust research☆235Jun 10, 2024Updated last year
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 9 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Comprehensive Windows Syscall Extraction & Analysis Framework☆174Aug 30, 2025Updated 8 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated 3 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆69Jan 5, 2026Updated 4 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆371Apr 8, 2026Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆60Jan 17, 2026Updated 4 months ago
- ☆31May 16, 2024Updated 2 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆28Nov 11, 2020Updated 5 years ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆129Dec 23, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆16Feb 23, 2021Updated 5 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆101Dec 23, 2025Updated 4 months ago
- A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, wit…☆295Feb 21, 2026Updated 3 months ago
- ☆65Mar 15, 2024Updated 2 years ago
- Enumerate your Kubernetes cluster with just 1 command☆11Apr 10, 2026Updated last month
- The home of the SDDLMaker☆29Jan 13, 2025Updated last year