An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD domain. Evades EDR detections through ADWS.
☆49Feb 23, 2026Updated 3 weeks ago
Alternatives and similar repositories for PyADRecon-ADWS
Users that are interested in PyADRecon-ADWS are comparing it to the libraries listed below
Sorting:
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆42Dec 30, 2025Updated 2 months ago
- adws enumeration bof☆169Feb 16, 2026Updated last month
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- NSecSoftBYOVD POC☆58Feb 12, 2026Updated last month
- a minimalistic winrm client written in python☆25Mar 6, 2026Updated 2 weeks ago
- Utilities for Pentesting with BloodHound☆22Feb 20, 2026Updated last month
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆174Sep 3, 2025Updated 6 months ago
- A set of tools and resources for analysis of Havoc C2☆27Feb 27, 2024Updated 2 years ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆46Feb 24, 2026Updated 3 weeks ago
- ☆62Feb 12, 2026Updated last month
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆134Oct 23, 2025Updated 4 months ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- ☆11Jul 31, 2017Updated 8 years ago
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.☆24Jan 15, 2026Updated 2 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 11 months ago
- Dominate the domain. Relay to royalty.☆261Mar 12, 2026Updated last week
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆103May 6, 2024Updated last year
- ☆31Aug 23, 2020Updated 5 years ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆128Feb 17, 2026Updated last month
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆16Nov 11, 2024Updated last year
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Malicious powershell scripts loader designed to avoid detection.☆61Jun 16, 2023Updated 2 years ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Apr 6, 2025Updated 11 months ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- A program for obfuscating C strings☆36Feb 26, 2023Updated 3 years ago
- ☆35Updated this week
- A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and sta…☆122Updated this week
- ☆16Nov 23, 2021Updated 4 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- RDP Checker☆64Feb 23, 2024Updated 2 years ago
- ☆43Dec 24, 2025Updated 2 months ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 7 months ago
- A library to parse, modify, and implement Malleable C2 profiles☆27Feb 9, 2019Updated 7 years ago