Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD domain.
☆59Feb 23, 2026Updated last month
Alternatives and similar repositories for PyADRecon
Users that are interested in PyADRecon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆179Oct 21, 2025Updated 5 months ago
- ☆38Jan 7, 2025Updated last year
- Red Team AI prompts☆49Dec 2, 2025Updated 3 months ago
- Import custom queries into BloodHound CE from a legacy BloodHound JSON file.☆10Mar 22, 2024Updated 2 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Backend development stack for agents☆29Jul 30, 2025Updated 7 months ago
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆195Feb 11, 2026Updated last month
- Rust crate to obfuscate strings and byte arrays so they are not in memory when not in use.☆20Mar 2, 2026Updated 3 weeks ago
- ☆18Jun 10, 2025Updated 9 months ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- ☆14Dec 24, 2023Updated 2 years ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 8 months ago
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆18Aug 24, 2025Updated 7 months ago
- ☆12Feb 19, 2026Updated last month
- A terminal workspace with batteries included☆19Sep 21, 2025Updated 6 months ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- Python Exploitation Framework☆38Mar 9, 2026Updated 2 weeks ago
- An Nmap XSL implementation with Bootstrap. Allows Nmap XML port scan results to be converted into beautiful HTML reports.☆85Feb 12, 2026Updated last month
- ☆108Feb 14, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- custom bloodhound queries and knowledge base☆12Apr 16, 2024Updated last year
- ☆153Oct 2, 2023Updated 2 years ago
- Tool to find code cave in PE image (x86 / x64) - Find empty space to place code in PE files☆72Aug 1, 2023Updated 2 years ago
- Impacket with --remove-mic-partial☆31Jan 8, 2026Updated 2 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 4 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- ☆65Mar 15, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆14Jan 4, 2026Updated 2 months ago
- This is a compiled cheatsheet from my experience of OSCP 2023 journey. Won't say it is all-rounded but a good starting point if you wanna…☆14Oct 17, 2024Updated last year
- ☆94May 26, 2023Updated 2 years ago
- Reflective PE loader written in Zig. Loads and executes native and .NET PE files directly from memory.☆18Mar 2, 2026Updated 3 weeks ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 2 months ago
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆66Mar 1, 2025Updated last year