Fun GUI for Group3rs output log
☆37Aug 14, 2023Updated 2 years ago
Alternatives and similar repositories for Group3rExplorer
Users that are interested in Group3rExplorer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- ☆20Sep 6, 2025Updated 6 months ago
- ☆26Mar 10, 2022Updated 4 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 3 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆168Nov 17, 2025Updated 4 months ago
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆149Mar 4, 2026Updated 2 weeks ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- ☆122Jun 17, 2025Updated 9 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆195Feb 16, 2026Updated last month
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆65Jan 10, 2025Updated last year
- Decrypt GlobalProtect configuration and cookie files.☆157Sep 10, 2024Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆64Jan 2, 2025Updated last year
- SetWinEventHook Sample☆50Sep 23, 2023Updated 2 years ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 7 months ago
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 6 months ago
- ☆38Feb 26, 2026Updated 3 weeks ago
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 3 years ago
- CVE-2024-40711-exp☆43Oct 17, 2024Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Feb 13, 2022Updated 4 years ago
- ☆88Jul 28, 2022Updated 3 years ago
- The Azure Execution Tool☆140Feb 6, 2026Updated last month
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Oct 21, 2024Updated last year
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Jan 23, 2025Updated last year
- Reportly is an AzureAD user activity report tool.☆96Aug 14, 2023Updated 2 years ago
- CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection☆17Sep 16, 2024Updated last year
- ☆38Jan 7, 2025Updated last year
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆28Aug 19, 2024Updated last year
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Patch AMSI and ETW☆250May 8, 2024Updated last year