Bloodhound alternative - simple ingestor. It generates low-level commands to exploit the AD easily and automatically: learn and control every steps. Many scenarios available (with a GPO parser).
☆65Mar 24, 2026Updated this week
Alternatives and similar repositories for GriffonAD
Users that are interested in GriffonAD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆16Mar 9, 2026Updated 2 weeks ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 2 months ago
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆39Feb 19, 2026Updated last month
- Styx is an cross-platform GUI interface for HackTheBox made in GoLang☆31Feb 8, 2026Updated last month
- dcsync bof☆46Feb 13, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆110Jan 21, 2026Updated 2 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆46Feb 24, 2026Updated last month
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆30Dec 7, 2025Updated 3 months ago
- A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and sta…☆164Mar 15, 2026Updated last week
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Source code for complete MALicious softWARE books I & II☆78Oct 10, 2025Updated 5 months ago
- Fast service fingerprinting CLI for 120+ protocols (TCP/UDP/SCTP) - built by Praetorian☆224Updated this week
- A lightweight test harness designed to speed up shellcode development by providing an execution environment with integrated crash diagnos…☆43Jan 15, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆117Dec 21, 2025Updated 3 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆23Mar 19, 2026Updated last week
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆176Updated this week
- A comprehensive collection of Open Source Intelligence (OSINT) tools and resources for cybersecurity professionals, researchers, and inve…☆29Feb 4, 2026Updated last month
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 7 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆54Oct 6, 2025Updated 5 months ago
- A cmake template for crystal palace☆40Dec 20, 2025Updated 3 months ago
- ☆38Feb 27, 2026Updated last month
- ☆179Oct 21, 2025Updated 5 months ago
- A simple website to act as a store for havoc modules and extensions☆29Jan 20, 2025Updated last year
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- Filesystem interaction via firebeam virtual machine execution☆42Mar 14, 2026Updated last week
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 2 months ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Bof of RegPwn by MDSec☆93Mar 15, 2026Updated last week
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 5 months ago
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆12Jun 3, 2025Updated 9 months ago
- ☆18Sep 22, 2024Updated last year
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆195Feb 11, 2026Updated last month
- This utility is designed to create ISO installation media for Windows 11 ARM from ESD files in Microsoft's software distribution infrast…☆10Jan 11, 2024Updated 2 years ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆167Jan 12, 2026Updated 2 months ago