daddycocoaman / azbeltView external linksLinks
AAD related enumeration in Nim
☆132Sep 7, 2023Updated 2 years ago
Alternatives and similar repositories for azbelt
Users that are interested in azbelt are comparing it to the libraries listed below
Sorting:
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆187Feb 12, 2023Updated 3 years ago
- Python module for running BOFs☆79Nov 28, 2025Updated 2 months ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆146May 18, 2024Updated last year
- DLL sideloading/proxying with Nim!☆175Dec 4, 2022Updated 3 years ago
- Apply a divide and conquer approach to bypass EDRs☆287Oct 19, 2023Updated 2 years ago
- Infect Shared Files In Memory for Lateral Movement☆196Dec 14, 2022Updated 3 years ago
- COFF and BOF Loader written in Nim☆176Aug 1, 2022Updated 3 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆882Feb 5, 2026Updated last week
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆302Mar 1, 2023Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆160Mar 1, 2024Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆77Feb 8, 2023Updated 3 years ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆385Updated this week
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆259May 10, 2023Updated 2 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆239Sep 3, 2023Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- A tool for pointesters to find candies in SharePoint☆277Nov 4, 2022Updated 3 years ago
- A care package of useful bofs for red team engagments☆55Dec 6, 2024Updated last year
- ☆385Jan 19, 2023Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆303Jan 20, 2026Updated 3 weeks ago
- ☆413Dec 14, 2023Updated 2 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆646Mar 20, 2024Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Apr 13, 2023Updated 2 years ago
- DPAPI looting remotely and locally in Python☆540Oct 7, 2025Updated 4 months ago
- ☆49Feb 11, 2023Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Collection of tools to use with Azure Applications☆112Oct 13, 2023Updated 2 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆358Dec 13, 2025Updated 2 months ago
- Running .NET from VBA☆149Feb 11, 2023Updated 3 years ago
- ☆107Jan 4, 2023Updated 3 years ago
- Nim Library for Offensive Security Development☆198Sep 4, 2023Updated 2 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆417Jan 27, 2024Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- Decrypt Veeam database passwords☆222Dec 8, 2025Updated 2 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆386Feb 23, 2024Updated last year
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆482Oct 14, 2022Updated 3 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Apr 4, 2025Updated 10 months ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆410May 29, 2024Updated last year
- Azure JWT Token Manipulation Toolset☆711Dec 6, 2024Updated last year