Extract registry and NTDS secrets from local or remote disk images
☆45Mar 15, 2025Updated 11 months ago
Alternatives and similar repositories for adiskreader-secretsdump
Users that are interested in adiskreader-secretsdump are comparing it to the libraries listed below
Sorting:
- Utilities for Pentesting with BloodHound☆22Feb 20, 2026Updated last week
- ☆18May 14, 2025Updated 9 months ago
- Async Python library to parse local and remote disk images.☆82Jul 11, 2025Updated 7 months ago
- TokenCert☆102Nov 15, 2024Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆164Apr 17, 2025Updated 10 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆275Dec 27, 2024Updated last year
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆131Aug 23, 2025Updated 6 months ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Asynchronous RDP client for Python (headless)☆228Aug 19, 2025Updated 6 months ago
- ☆198Mar 28, 2025Updated 11 months ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- ☆43Jun 1, 2025Updated 9 months ago
- ☆26Aug 5, 2025Updated 6 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆393Feb 9, 2026Updated 3 weeks ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- Okta Verify and Okta FastPass Abuse Tool☆340Sep 4, 2024Updated last year
- Cs-Sleep-Mask-Fiber☆18May 16, 2025Updated 9 months ago
- ☆235Oct 8, 2024Updated last year
- ScriptSentry finds misconfigured and dangerous logon scripts.☆624Feb 16, 2026Updated 2 weeks ago
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆361Dec 13, 2025Updated 2 months ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆60Updated this week
- Automatically run and populate a new instance of BH CE☆115Jan 30, 2026Updated last month
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 4 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Feb 25, 2025Updated last year
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆314Feb 16, 2026Updated 2 weeks ago