Extract registry and NTDS secrets from local or remote disk images
☆45Mar 15, 2025Updated last year
Alternatives and similar repositories for adiskreader-secretsdump
Users that are interested in adiskreader-secretsdump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Utilities for Pentesting with BloodHound☆22Feb 20, 2026Updated last month
- Async Python library to parse local and remote disk images.☆82Jul 11, 2025Updated 8 months ago
- TokenCert☆102Nov 15, 2024Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆166Apr 17, 2025Updated 11 months ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- ☆20Mar 10, 2026Updated last week
- ☆44Jun 1, 2025Updated 9 months ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Asynchronous RDP client for Python (headless)☆233Aug 19, 2025Updated 7 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 7 months ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- ☆198Mar 28, 2025Updated 11 months ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- ☆26Aug 5, 2025Updated 7 months ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆625Feb 16, 2026Updated last month
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆398Feb 9, 2026Updated last month
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Oct 21, 2024Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆361Dec 13, 2025Updated 3 months ago
- Cs-Sleep-Mask-Fiber☆18May 16, 2025Updated 10 months ago
- ☆287Aug 14, 2025Updated 7 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 6 months ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- Okta Verify and Okta FastPass Abuse Tool☆341Sep 4, 2024Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- ☆234Oct 8, 2024Updated last year
- Automatically run and populate a new instance of BH CE☆120Jan 30, 2026Updated last month
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆200Apr 21, 2025Updated 11 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 3 years ago
- pysnaffler☆110Jan 6, 2026Updated 2 months ago