POC tool to abuse windows server failover clusters
☆56Aug 7, 2025Updated 8 months ago
Alternatives and similar repositories for fustercluck
Users that are interested in fustercluck are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rainbow table generation & lookup tools.☆34Dec 17, 2025Updated 3 months ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Mar 30, 2026Updated last week
- SCEP request tool for AD CS and Intune☆75Oct 24, 2025Updated 5 months ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 4 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 11 months ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 8 months ago
- Hybrid AD utilities for ROADtools☆110May 25, 2025Updated 10 months ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Aug 4, 2022Updated 3 years ago
- Scripts that automate portions of pentests.☆58Mar 18, 2026Updated 3 weeks ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 8 months ago
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 9 months ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated 3 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 3 months ago
- a small script to collect information from a management point☆37Jan 19, 2026Updated 2 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 6 months ago
- TokenCert☆102Nov 15, 2024Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- ☆18Feb 29, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Linker for Beacon Object Files☆172Mar 30, 2026Updated last week
- ☆19Sep 1, 2025Updated 7 months ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 8 months ago
- A simple Bash script to discover all domains associated with a specific Microsoft 365 tenant - new replacement for check_mdi☆47Sep 23, 2025Updated 6 months ago
- results of scraping OneDrive from February 2022 - March 2025☆27Apr 29, 2025Updated 11 months ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆169Nov 17, 2025Updated 4 months ago
- ☆19Mar 29, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆135Nov 12, 2025Updated 4 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆44Jan 18, 2026Updated 2 months ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last month
- Extension functionality for the NightHawk operator client☆27Oct 31, 2023Updated 2 years ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 7 months ago