Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems
☆24Jun 14, 2023Updated 2 years ago
Alternatives and similar repositories for SSSD-creds
Users that are interested in SSSD-creds are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- EMQX Dashboard Malicious Plugin leading to RCE☆47Jun 16, 2025Updated 10 months ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆22Mar 31, 2019Updated 7 years ago
- ☆24Sep 6, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- Set of PoC to abuse Windows minifilters functionality☆76May 1, 2026Updated last week
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated last year
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated 2 months ago
- BypassCredGuard CS BOF☆53Jan 23, 2025Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆129Feb 17, 2026Updated 2 months ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆184Aug 16, 2025Updated 8 months ago
- Tool to obtain hash using MS-SNTP for user accounts☆31Jan 22, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆86Jan 26, 2026Updated 3 months ago
- Extract the Procedures (TTP) from CTI reports☆18Dec 13, 2025Updated 4 months ago
- Analyze secretsdump output and hashcat potfiles to find shared passwords and weak credentials in Active Directory☆37Apr 4, 2026Updated last month
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated last year
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Python script that converts Grafana hash digests to PBKDF2_HMAC_SHA256 format in order to facilitate password cracking using Hashcat.☆26Oct 24, 2021Updated 4 years ago
- ☆13Feb 4, 2025Updated last year
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆24Feb 17, 2024Updated 2 years ago
- All Apprentice and Practitioner-level Portswigger labs☆37May 18, 2023Updated 2 years ago
- ☆12Oct 9, 2020Updated 5 years ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- Parser of the industrial protocol S7 (S7comm) using Libpcap☆15May 1, 2020Updated 6 years ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated last year
- ☆39Jan 7, 2025Updated last year
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆17Feb 27, 2024Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆64May 29, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Golden collection of weak passwords☆71Dec 12, 2024Updated last year
- Vulnserver exploits☆14May 1, 2020Updated 6 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 3 years ago
- Creating attacks paths across management and data planes☆50Updated this week
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year