Dominate the domain. Relay to royalty.
☆314Mar 31, 2026Updated last month
Alternatives and similar repositories for RelayKing-Depth
Users that are interested in RelayKing-Depth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 6 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 5 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆81Oct 27, 2025Updated 6 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆309Mar 28, 2026Updated last month
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆83Mar 15, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆42Oct 14, 2025Updated 7 months ago
- TokenCert☆103Nov 15, 2024Updated last year
- ☆236Oct 8, 2024Updated last year
- Opengraph-Compatible JSON Generator for BloodHound☆28Mar 30, 2026Updated last month
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) through a SOCKS5 pr…☆198Apr 27, 2026Updated 3 weeks ago
- A Python POC for CRED1 over SOCKS5☆167Oct 5, 2024Updated last year
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆51Feb 23, 2026Updated 2 months ago
- A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, wit…☆295Feb 21, 2026Updated 3 months ago
- Enumerate Domain Users Without Authentication☆288Apr 22, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆129Jan 29, 2026Updated 3 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 3 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆173Jul 31, 2025Updated 9 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 10 months ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆134Jan 26, 2026Updated 3 months ago
- dcsync bof☆52Feb 13, 2026Updated 3 months ago
- A Cobalt Strike BOF implementation of the SilentHarvest registry dumping technique☆177Apr 14, 2026Updated last month
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Proof-of-Concept tool for extracting credential material from sessions on modern Windows systems.☆688May 9, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Red Team Coin for crypto-mining operations.☆24Mar 1, 2026Updated 2 months ago
- Lateral Movement Bof with MSI ODBC Driver Install☆149Sep 30, 2025Updated 7 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆272Nov 12, 2024Updated last year
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆38Oct 9, 2025Updated 7 months ago
- ☆123Nov 21, 2024Updated last year
- The DCERPC only printerbug.py version☆219Oct 30, 2025Updated 6 months ago
- MAPS cloud scanner and response parser for Microsoft Defender research.☆92Feb 19, 2026Updated 3 months ago
- Continuous password spraying tool☆210Mar 12, 2026Updated 2 months ago
- ☆48Dec 21, 2025Updated 5 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and sta…☆205Mar 15, 2026Updated 2 months ago
- Windows remote execution multitool☆795Mar 25, 2026Updated last month
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆84Dec 15, 2025Updated 5 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Automating the MITM attack on WSUS☆363Apr 3, 2026Updated last month
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆242Aug 25, 2024Updated last year
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆203Jun 17, 2025Updated 11 months ago