Fun GUI for Group3rs output log
☆37Aug 14, 2023Updated 2 years ago
Alternatives and similar repositories for Group3rExplorer
Users that are interested in Group3rExplorer are comparing it to the libraries listed below
Sorting:
- ☆20Sep 6, 2025Updated 5 months ago
- ☆26Mar 10, 2022Updated 3 years ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- ☆117Jun 17, 2025Updated 8 months ago
- ☆33Updated this week
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 3 months ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆190Feb 16, 2026Updated 2 weeks ago
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Jan 23, 2025Updated last year
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆167Nov 17, 2025Updated 3 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Decrypt GlobalProtect configuration and cookie files.☆158Sep 10, 2024Updated last year
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 5 months ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆63Jan 10, 2025Updated last year
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆131Aug 23, 2025Updated 6 months ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆27Dec 20, 2025Updated 2 months ago
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆50Feb 23, 2026Updated last week
- ☆38Jan 7, 2025Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆64Jan 2, 2025Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Feb 13, 2022Updated 4 years ago
- The Azure Execution Tool☆133Feb 6, 2026Updated 3 weeks ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- ☆88Jul 28, 2022Updated 3 years ago
- ☆242May 5, 2024Updated last year
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆37Jul 23, 2025Updated 7 months ago
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 3 months ago
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- Validates priv escalation of AD trusts☆48Apr 1, 2025Updated 11 months ago
- Patch AMSI and ETW☆249May 8, 2024Updated last year