Dominate the domain. Relay to royalty.
☆282Mar 31, 2026Updated last week
Alternatives and similar repositories for RelayKing-Depth
Users that are interested in RelayKing-Depth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 4 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 3 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆79Oct 27, 2025Updated 5 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆300Mar 28, 2026Updated 2 weeks ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 5 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- TokenCert☆102Nov 15, 2024Updated last year
- ☆234Oct 8, 2024Updated last year
- Opengraph-Compatible JSON Generator for BloodHound☆27Mar 30, 2026Updated last week
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆169Jan 23, 2026Updated 2 months ago
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆50Feb 23, 2026Updated last month
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, wit…☆291Feb 21, 2026Updated last month
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 11 months ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆126Jan 29, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 2 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆173Jul 31, 2025Updated 8 months ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆111Jan 26, 2026Updated 2 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 9 months ago
- dcsync bof☆50Feb 13, 2026Updated last month
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.☆649Oct 27, 2025Updated 5 months ago
- MAPS cloud scanner and response parser for Microsoft Defender research.☆88Feb 19, 2026Updated last month
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆72Dec 15, 2025Updated 3 months ago
- A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and sta…☆184Mar 15, 2026Updated 3 weeks ago
- Lateral Movement Bof with MSI ODBC Driver Install☆148Sep 30, 2025Updated 6 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- The DCERPC only printerbug.py version☆215Oct 30, 2025Updated 5 months ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 6 months ago
- ☆122Nov 21, 2024Updated last year
- Continuous password spraying tool☆204Mar 12, 2026Updated 3 weeks ago
- ☆48Dec 21, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Automating the MITM attack on WSUS☆326Apr 3, 2026Updated last week
- Windows remote execution multitool☆786Mar 25, 2026Updated 2 weeks ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆201Jun 17, 2025Updated 9 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆243Aug 25, 2024Updated last year
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- ☆55May 31, 2025Updated 10 months ago