PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)
☆17Feb 6, 2026Updated 2 months ago
Alternatives and similar repositories for Invoke-DCSync
Users that are interested in Invoke-DCSync are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A mock torrent tracker, in the form of a Lambda, which always replies with a failure response but provides your IP address as the failure…☆25Aug 30, 2024Updated last year
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆61Feb 23, 2026Updated 2 months ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Apr 1, 2026Updated 3 weeks ago
- All combinations of various characters, to get the desired word☆21Dec 13, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Red Team Server (RTS)☆16Apr 16, 2026Updated 2 weeks ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆27Apr 1, 2026Updated 3 weeks ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Jul 12, 2023Updated 2 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 9 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- An Nmap XSL implementation with Bootstrap. Allows Nmap XML port scan results to be converted into beautiful HTML reports.☆85Feb 12, 2026Updated 2 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 6 months ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- ☆12Nov 12, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆188Jun 14, 2025Updated 10 months ago
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated last year
- Research of modifying exported function names at runtime (C/C++, Windows)☆18May 28, 2024Updated last year
- Wrapper for concurrent batch processing of testssl.sh commands☆13Mar 15, 2019Updated 7 years ago
- ☆12Sep 29, 2025Updated 7 months ago
- A repo of scripts I find helpful for daily tasks.☆30Dec 8, 2025Updated 4 months ago
- Heavily obfuscated PowerShell reverse shell that can bypass Windows Defender☆22Jan 3, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆16Jun 15, 2025Updated 10 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated 11 months ago
- Rust crate to obfuscate strings and byte arrays so they are not in memory when not in use.☆21Apr 23, 2026Updated last week
- Activities by RE:UN10N members☆25Updated this week
- Generate IDN homographs and phishing domains☆13Aug 21, 2023Updated 2 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆76Nov 12, 2021Updated 4 years ago
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated 2 years ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆67Jan 10, 2025Updated last year
- ☆28Sep 9, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated last year
- ☆22Jul 13, 2022Updated 3 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆28Jan 5, 2021Updated 5 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Frida Memory Dumper and Scanner for native Linux apps and Windows apps☆20Oct 18, 2022Updated 3 years ago