Ad hoc collection of Red Teaming & Active Directory tooling.
☆229Aug 3, 2023Updated 2 years ago
Alternatives and similar repositories for Toolies
Users that are interested in Toolies are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compiled Binaries for Ghostpack☆1,666Oct 24, 2024Updated last year
- ☆261Feb 17, 2023Updated 3 years ago
- Powershell tool to automate Active Directory enumeration.☆1,302Apr 16, 2026Updated 2 weeks ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,863Apr 23, 2026Updated last week
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆46Sep 25, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆190May 29, 2023Updated 2 years ago
- Code snippets for exploring malware techniques in C.☆16May 27, 2023Updated 2 years ago
- Privilege Escalation Enumeration Script for Windows☆3,819Apr 16, 2026Updated 2 weeks ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,504Feb 15, 2026Updated 2 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,390Sep 22, 2025Updated 7 months ago
- SeRestorePrivilege to SYSTEM☆136Oct 8, 2021Updated 4 years ago
- ☆52Oct 10, 2025Updated 6 months ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆633Aug 15, 2025Updated 8 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆739Sep 3, 2025Updated 7 months ago
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,377Jul 12, 2024Updated last year
- PowerShell MachineAccountQuota and DNS exploit tools☆1,461Jan 11, 2023Updated 3 years ago
- Weaponizing for privileged file writes bugs with windows problem reporting☆249May 10, 2022Updated 3 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,312Aug 20, 2024Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,584Mar 11, 2026Updated last month
- Root shell PoC for CVE-2021-3156☆71Feb 3, 2021Updated 5 years ago
- A Python based ingestor for BloodHound☆2,380Oct 24, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Dominate Active Directory with PowerShell.☆1,181Nov 28, 2025Updated 5 months ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆676May 3, 2020Updated 5 years ago
- ☆13Jan 3, 2021Updated 5 years ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆639May 8, 2025Updated 11 months ago
- ☆2,246Nov 24, 2023Updated 2 years ago
- Squid Pivoting Open Port Scanner☆101Dec 5, 2024Updated last year
- ☆29Oct 1, 2025Updated 7 months ago
- Juicy Potato for x86 Windows☆132Oct 12, 2019Updated 6 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Aspx reverse shell☆123Feb 4, 2020Updated 6 years ago
- ☆164Sep 26, 2023Updated 2 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,233Sep 10, 2020Updated 5 years ago
- Active Directory certificate abuse.☆1,968Mar 30, 2026Updated last month
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆267Mar 2, 2026Updated 2 months ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,639Aug 6, 2022Updated 3 years ago