Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Supports OU filtering and removes disabled hosts.
☆38Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for badgerDAPS
Users that are interested in badgerDAPS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆187Jan 27, 2024Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 3 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Feb 11, 2024Updated 2 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆22Jul 9, 2024Updated last year
- Collection of random RedTeam scripts.☆212Mar 8, 2024Updated 2 years ago
- Sample Rust Hooking Engine☆34Apr 5, 2024Updated 2 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆449Dec 21, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆18Dec 12, 2023Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆146Feb 1, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- ☆70Oct 30, 2023Updated 2 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆32May 23, 2025Updated 11 months ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- ☆291Jul 20, 2023Updated 2 years ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆687Aug 15, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Nov 5, 2023Updated 2 years ago
- Simulate Windows EXE for Malware Research!☆20Sep 4, 2024Updated last year
- ☆128Jun 28, 2023Updated 2 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆183Aug 16, 2025Updated 8 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆743May 19, 2023Updated 2 years ago
- Azure DevOps Services Attack Toolkit☆151Updated this week
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- ☆164Sep 26, 2023Updated 2 years ago
- ☆185Dec 4, 2024Updated last year
- ☆13Dec 21, 2023Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75May 19, 2024Updated last year
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆172Nov 26, 2023Updated 2 years ago