Dominate the domain. Relay to royalty.
☆261Mar 12, 2026Updated last week
Alternatives and similar repositories for RelayKing-Depth
Users that are interested in RelayKing-Depth are comparing it to the libraries listed below
Sorting:
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 3 months ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 5 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated 2 months ago
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆49Feb 23, 2026Updated 3 weeks ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆78Oct 27, 2025Updated 4 months ago
- A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, wit…☆282Feb 21, 2026Updated last month
- ☆234Oct 8, 2024Updated last year
- A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and sta…☆122Mar 15, 2026Updated last week
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 11 months ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆166Jan 23, 2026Updated last month
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆121Jan 29, 2026Updated last month
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆169Jul 31, 2025Updated 7 months ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆107Jan 26, 2026Updated last month
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- MAPS cloud scanner and response parser for Microsoft Defender research.☆86Feb 19, 2026Updated last month
- Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.☆638Oct 27, 2025Updated 4 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- ☆121Nov 21, 2024Updated last year
- Automating the MITM attack on WSUS☆312Updated this week
- ☆49Dec 21, 2025Updated 3 months ago
- Windows remote execution multitool☆785Mar 10, 2026Updated last week
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆199Jun 17, 2025Updated 9 months ago
- Continuous password spraying tool☆204Mar 12, 2026Updated last week
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- ☆55May 31, 2025Updated 9 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,330Nov 12, 2025Updated 4 months ago
- Lateral Movement Bof with MSI ODBC Driver Install☆147Sep 30, 2025Updated 5 months ago
- Deception implementation through analysis of BloodHound data☆55Oct 9, 2025Updated 5 months ago
- The DCERPC only printerbug.py version☆210Oct 30, 2025Updated 4 months ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆67Dec 15, 2025Updated 3 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- ☆62Feb 12, 2026Updated last month