Collection of scripts to retrieve stored passwords from Veeam Backup
☆143Jun 3, 2025Updated 10 months ago
Alternatives and similar repositories for veeam-creds
Users that are interested in veeam-creds are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Decrypt Veeam database passwords☆224Dec 8, 2025Updated 4 months ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆116Mar 23, 2023Updated 3 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆72Mar 28, 2023Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆270Mar 18, 2021Updated 5 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆995Jan 29, 2023Updated 3 years ago
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆302Mar 4, 2020Updated 6 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Sep 13, 2024Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- Fileless atexec, no more need for port 445☆406Mar 28, 2024Updated 2 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- A repository with my code snippets for research/education purposes.☆53Jul 28, 2023Updated 2 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆402Aug 15, 2025Updated 8 months ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆569Jun 5, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆58Feb 20, 2022Updated 4 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Dump NTDS with golden certificates and UnPAC the hash☆648Mar 20, 2024Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆77Jul 29, 2024Updated last year
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆902Apr 8, 2025Updated last year
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- NSE script to detect ProxyOracle☆13Aug 30, 2021Updated 4 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆943Nov 11, 2024Updated last year
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆27May 6, 2025Updated 11 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,075Updated this week
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆364Dec 13, 2025Updated 4 months ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆948Jul 26, 2021Updated 4 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,161Apr 22, 2026Updated last week
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 3 years ago
- ☆246May 5, 2024Updated last year
- Recovering NTLM hashes from Credential Guard☆384Dec 26, 2022Updated 3 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆485Oct 14, 2022Updated 3 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆140Sep 12, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 3 years ago
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆431Nov 12, 2025Updated 5 months ago
- a BOF implementation of various registry persistence methods☆97Nov 11, 2025Updated 5 months ago
- Dumping DPAPI credz remotely☆1,361Mar 24, 2025Updated last year
- ☆1,812Aug 30, 2024Updated last year
- Collection of remote authentication triggers in C#☆528May 15, 2024Updated last year