fully async implementation of Dirkjan's ROADTools
☆34Mar 15, 2025Updated last year
Alternatives and similar repositories for aroadtools
Users that are interested in aroadtools are comparing it to the libraries listed below
Sorting:
- ☆12Feb 19, 2026Updated last month
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258May 10, 2023Updated 2 years ago
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 4 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Asynchronous NFSv3 client in pure Python☆28Jul 16, 2025Updated 8 months ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Abusing Azure services over C2☆367Jan 20, 2026Updated 2 months ago
- ☆20Feb 1, 2026Updated last month
- Get Fine Grained Password Policy☆78Mar 13, 2026Updated last week
- Nim Library for Offensive Security Development☆199Sep 4, 2023Updated 2 years ago
- ☆16May 29, 2024Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Feb 13, 2022Updated 4 years ago
- ☆29May 16, 2023Updated 2 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- ☆90Jun 18, 2023Updated 2 years ago
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆40Jun 17, 2025Updated 9 months ago
- Generate IDN homographs and phishing domains☆13Aug 21, 2023Updated 2 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆374Dec 23, 2025Updated 2 months ago
- A sock, with a wire, so you can tunnel all you desire.☆297Jan 19, 2024Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- wsnet☆26Mar 4, 2026Updated 2 weeks ago
- ☆307Mar 15, 2025Updated last year
- ☆218Mar 26, 2024Updated last year
- Automated exploitation of MSSQL servers at scale☆128Feb 21, 2026Updated last month
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆199Nov 4, 2025Updated 4 months ago
- ☆44Jun 1, 2025Updated 9 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Windows Thread Pool Injection Havoc Implementation☆34Mar 23, 2024Updated last year
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated last month
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated 2 years ago
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago