fully async implementation of Dirkjan's ROADTools
☆34Mar 15, 2025Updated last year
Alternatives and similar repositories for aroadtools
Users that are interested in aroadtools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Feb 19, 2026Updated 2 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆261May 10, 2023Updated 2 years ago
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 6 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Asynchronous NFSv3 client in pure Python☆29Jul 16, 2025Updated 9 months ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- LetMeOutOfYour.net Resources☆21Apr 11, 2026Updated 2 weeks ago
- Abusing Azure services over C2☆370Jan 20, 2026Updated 3 months ago
- Get Fine Grained Password Policy☆78Mar 13, 2026Updated last month
- ☆21Feb 1, 2026Updated 2 months ago
- Nim Library for Offensive Security Development☆200Sep 4, 2023Updated 2 years ago
- ☆16May 29, 2024Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆116Feb 13, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆29May 16, 2023Updated 2 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- ☆90Jun 18, 2023Updated 2 years ago
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆40Jun 17, 2025Updated 10 months ago
- Generate IDN homographs and phishing domains☆13Aug 21, 2023Updated 2 years ago
- A sock, with a wire, so you can tunnel all you desire.☆296Jan 19, 2024Updated 2 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆383Dec 23, 2025Updated 4 months ago
- ☆14Sep 26, 2023Updated 2 years ago
- wsnet☆26Mar 4, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆307Mar 15, 2025Updated last year
- Automated exploitation of MSSQL servers at scale☆127Apr 22, 2026Updated last week
- ☆221Mar 26, 2024Updated 2 years ago
- ysoserial.net docker image☆30Sep 23, 2024Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆207Nov 4, 2025Updated 5 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Windows Thread Pool Injection Havoc Implementation☆34Mar 23, 2024Updated 2 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated 2 months ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated 2 years ago
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆46Jun 1, 2025Updated 10 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago