This C# tool sprays for admin access over the entire domain
☆88Dec 7, 2025Updated 2 months ago
Alternatives and similar repositories for Find-AdminAccess
Users that are interested in Find-AdminAccess are comparing it to the libraries listed below
Sorting:
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆33Aug 18, 2025Updated 6 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆26Dec 20, 2025Updated 2 months ago
- Token impersonation in PowerShell to execute under the context of another user.☆24Oct 14, 2025Updated 4 months ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated 2 weeks ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆95Feb 3, 2026Updated 3 weeks ago
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆237Feb 20, 2026Updated last week
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆64Jan 19, 2026Updated last month
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆65Jun 10, 2025Updated 8 months ago
- Stealthy In-Memory Local Password Harvester (SILPH) tool: dump LSA, SAM and DCC2 with indirect syscall☆132Dec 17, 2025Updated 2 months ago
- Slides and resources from MCTTP 2025 Talk☆66Oct 26, 2025Updated 4 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆137Apr 18, 2025Updated 10 months ago
- ☆52Jul 8, 2025Updated 7 months ago
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Dec 7, 2025Updated 2 months ago
- Just another EDR killer☆125Jan 21, 2026Updated last month
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 10 months ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆157Nov 23, 2025Updated 3 months ago
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆36Dec 18, 2025Updated 2 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆259Nov 3, 2025Updated 4 months ago
- ☆55May 31, 2025Updated 9 months ago
- A tool written in golang which compress using UPX and patch it with the provided PE file to make "UPX -d" flag impossible to decompress a…☆31Jan 2, 2025Updated last year
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆163Nov 2, 2025Updated 4 months ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 8 months ago
- Windows Session Hijacking via COM☆339Dec 13, 2025Updated 2 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆215Oct 19, 2024Updated last year
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆138Jul 2, 2025Updated 8 months ago
- UDC2 implementation that provides an ICMP C2 channel☆115Nov 24, 2025Updated 3 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆63Jan 10, 2025Updated last year
- A PoC for Early Cascade process injection technique.☆211Jan 30, 2025Updated last year
- This is the tool to dump the LSASS process on modern Windows 11☆557Nov 1, 2025Updated 4 months ago
- NSecSoftBYOVD POC☆57Feb 12, 2026Updated 2 weeks ago
- ☆82Apr 28, 2025Updated 10 months ago
- ☆121Sep 13, 2023Updated 2 years ago
- Red Team Coin for crypto-mining operations.☆23Jan 12, 2026Updated last month
- ☆13Jul 30, 2021Updated 4 years ago