☆49Feb 12, 2026Updated 2 weeks ago
Alternatives and similar repositories for CAPSlock
Users that are interested in CAPSlock are comparing it to the libraries listed below
Sorting:
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 10 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- Automation around Entra ID☆38Jul 21, 2025Updated 7 months ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- Python script to leverage MSFT_MTProcess WMI class☆39Sep 17, 2025Updated 5 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆26Dec 20, 2025Updated 2 months ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆23Jun 22, 2021Updated 4 years ago
- A tool to play with scheduled tasks on Windows, in Rust☆121Nov 1, 2025Updated 3 months ago
- PowerShell module to play with Kerberos S4U extensions☆23Sep 14, 2017Updated 8 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Abusing Azure services over C2☆368Jan 20, 2026Updated last month
- ☆47Dec 5, 2025Updated 2 months ago
- Shellcode injection using the Windows Debugging API☆167Jan 4, 2026Updated last month
- adws enumeration bof☆167Feb 16, 2026Updated last week
- Ingest openldap data into bloodhound☆79Apr 1, 2021Updated 4 years ago
- Mockingjay process self injection POC☆44Aug 8, 2023Updated 2 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆41Jan 14, 2026Updated last month
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- A C# utility for interacting with SCOM☆96Dec 2, 2025Updated 2 months ago
- Golang bindings for PE-sieve☆42Nov 11, 2023Updated 2 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- ☆14Feb 6, 2026Updated 3 weeks ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆172Sep 3, 2025Updated 5 months ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆45Jun 24, 2023Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- Hybrid AD utilities for ROADtools☆108May 25, 2025Updated 9 months ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 6 months ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- CraftCMS RCE Checker (CVE-2025-32432)☆10Apr 27, 2025Updated 10 months ago
- Tools to work with the pwnedkeys.com API☆10Dec 20, 2018Updated 7 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- NTAPI hook bypass with (semi) legit stack trace