Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Project/LOLBAS), WADComs (https://wadcoms.github.io), and HijackLibs (https://hijacklibs.net/).
☆284Jun 16, 2023Updated 2 years ago
Alternatives and similar repositories for GTFOBLookup
Users that are interested in GTFOBLookup are comparing it to the libraries listed below
Sorting:
- A curated list of awesome BloodhoundAD resources☆237Oct 13, 2022Updated 3 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 5 months ago
- ☆128May 22, 2023Updated 2 years ago
- ☆1,670Apr 14, 2025Updated 10 months ago
- Identifies the bytes that Microsoft Defender flags on.☆2,582Dec 31, 2025Updated 2 months ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆299Oct 2, 2019Updated 6 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,305Aug 19, 2019Updated 6 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- Active Directory information dumper via LDAP☆1,385Apr 6, 2025Updated 11 months ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆195Jun 30, 2019Updated 6 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆1,861Aug 12, 2021Updated 4 years ago
- NTLMv1 Multitool☆659Feb 26, 2026Updated last week
- SharpUp is a C# port of various PowerUp functionality.☆1,461Feb 14, 2024Updated 2 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆808Aug 28, 2022Updated 3 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆761Sep 23, 2024Updated last year
- ☆17Jul 26, 2018Updated 7 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated last month
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,303Dec 15, 2020Updated 5 years ago
- A tool to password spray Jenkins instances☆60May 28, 2019Updated 6 years ago
- Active Directory ACL exploitation with BloodHound☆755Nov 18, 2021Updated 4 years ago
- Privilege Escalation Enumeration Script for Windows☆3,708Jan 30, 2026Updated last month
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,537Jan 27, 2025Updated last year
- Extract credentials from lsass remotely☆2,180Dec 24, 2025Updated 2 months ago
- Collection of Offensive C# Tooling☆1,470Feb 6, 2023Updated 3 years ago
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆782Aug 26, 2025Updated 6 months ago
- A Python based ingestor for BloodHound☆2,347Oct 24, 2025Updated 4 months ago
- C# implementation of harmj0y's PowerView☆1,086Mar 22, 2024Updated last year
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 8 years ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- Run PowerShell command without invoking powershell.exe☆1,533Mar 23, 2023Updated 2 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆826Nov 15, 2025Updated 3 months ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,402Feb 24, 2023Updated 3 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆331Oct 20, 2019Updated 6 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,729Jan 16, 2026Updated last month
- Dump stuff without touching disk☆163Oct 29, 2020Updated 5 years ago