PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)
☆17Feb 6, 2026Updated 3 weeks ago
Alternatives and similar repositories for Invoke-DCSync
Users that are interested in Invoke-DCSync are comparing it to the libraries listed below
Sorting:
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- Red Team Server (RTS)☆16Mar 8, 2024Updated last year
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 8 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 2 years ago
- ☆26Mar 6, 2025Updated 11 months ago
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated last year
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Jul 12, 2023Updated 2 years ago
- Active DIrectory Lab for Pentesting Practice☆24Aug 9, 2022Updated 3 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- Comprehensive parsing script for grepable Nmap output files. Provides a summary table, split hosts files, and URLs for web and SMB hosts.☆20Apr 17, 2020Updated 5 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated 9 months ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- A utility that automatically takes screenshots of coordinates using Google Earth.☆27Jan 5, 2021Updated 5 years ago
- A mock torrent tracker, in the form of a Lambda, which always replies with a failure response but provides your IP address as the failure…☆26Aug 30, 2024Updated last year
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 11 months ago
- All things specific to LLM Red Teaming Generative AI☆29Oct 22, 2024Updated last year
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆29Jan 11, 2023Updated 3 years ago
- ☆28Sep 9, 2024Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆36Oct 1, 2025Updated 4 months ago
- ☆186Jun 14, 2025Updated 8 months ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated last year
- This tool can gather a lot of info without any defender alerts. It is useful for Penetration testers, SOC Analysts, System administrators…☆29Apr 9, 2025Updated 10 months ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- ☆10Updated this week
- ☆11Feb 28, 2022Updated 4 years ago
- A repo of scripts I find helpful for daily tasks.☆30Dec 8, 2025Updated 2 months ago
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024☆39Oct 20, 2025Updated 4 months ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆33Jun 28, 2022Updated 3 years ago
- Excel parser for various pentesting tools.☆30Jun 13, 2023Updated 2 years ago
- Automated Active Directory lab running on Proxmox☆88Aug 8, 2025Updated 6 months ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Web for Pentester I☆11Sep 21, 2018Updated 7 years ago
- The list of files through which we can pop-up the java script alert box☆40Mar 5, 2018Updated 7 years ago
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago