Ad hoc collection of Red Teaming & Active Directory tooling.
☆227Aug 3, 2023Updated 2 years ago
Alternatives and similar repositories for Toolies
Users that are interested in Toolies are comparing it to the libraries listed below
Sorting:
- ☆254Feb 17, 2023Updated 3 years ago
- Compiled Binaries for Ghostpack☆1,604Oct 24, 2024Updated last year
- Powershell tool to automate Active Directory enumeration.☆1,284Sep 9, 2025Updated 5 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,779Feb 18, 2026Updated last week
- Privilege Escalation Enumeration Script for Windows☆3,697Jan 30, 2026Updated last month
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,301Feb 15, 2026Updated 2 weeks ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆638May 8, 2025Updated 9 months ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆730Sep 3, 2025Updated 5 months ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆614Aug 15, 2025Updated 6 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,350Sep 22, 2025Updated 5 months ago
- ☆181May 29, 2023Updated 2 years ago
- Dominate Active Directory with PowerShell.☆1,164Nov 28, 2025Updated 3 months ago
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,341Jul 12, 2024Updated last year
- SeRestorePrivilege to SYSTEM☆133Oct 8, 2021Updated 4 years ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆325Apr 12, 2024Updated last year
- ☆163Sep 26, 2023Updated 2 years ago
- ☆51Oct 10, 2025Updated 4 months ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,438Jan 11, 2023Updated 3 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆568Jan 20, 2026Updated last month
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆323May 17, 2024Updated last year
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆45Aug 16, 2024Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆49Updated this week
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆539May 9, 2025Updated 9 months ago
- Active Directory certificate abuse.☆1,921Oct 27, 2025Updated 4 months ago
- Attempt at Obfuscated version of SharpCollection☆243Nov 15, 2025Updated 3 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,255Aug 20, 2024Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFs☆607Feb 21, 2024Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆82Nov 28, 2023Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆614Jan 2, 2025Updated last year
- The Network Execution Tool☆5,279Feb 23, 2026Updated last week
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆401Updated this week
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,532Jan 27, 2025Updated last year
- AD ACL abuse☆388Sep 11, 2025Updated 5 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆387Feb 23, 2024Updated 2 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,413Jul 27, 2025Updated 7 months ago