fully async implementation of Dirkjan's ROADTools
☆34Mar 15, 2025Updated 11 months ago
Alternatives and similar repositories for aroadtools
Users that are interested in aroadtools are comparing it to the libraries listed below
Sorting:
- ☆12Feb 19, 2026Updated last week
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258May 10, 2023Updated 2 years ago
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 4 months ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Nim Library for Offensive Security Development☆197Sep 4, 2023Updated 2 years ago
- Get Fine Grained Password Policy☆77Apr 15, 2025Updated 10 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Generate IDN homographs and phishing domains☆13Aug 21, 2023Updated 2 years ago
- Asynchronous NFSv3 client in pure Python☆28Jul 16, 2025Updated 7 months ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Feb 13, 2022Updated 4 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated 2 weeks ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 7 months ago
- ☆14Sep 26, 2023Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- ☆29May 16, 2023Updated 2 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- ☆16May 29, 2024Updated last year
- Windows Thread Pool Injection Havoc Implementation☆33Mar 23, 2024Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ☆42Jun 1, 2025Updated 9 months ago
- Run BloodHound CE in a single-user setup with podman☆36Nov 12, 2025Updated 3 months ago
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated last year
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- Automated exploitation of MSSQL servers at scale☆127Feb 21, 2026Updated last week
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 2 years ago
- ☆307Mar 15, 2025Updated 11 months ago
- Abusing Azure services over C2☆368Jan 20, 2026Updated last month
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Dec 29, 2017Updated 8 years ago
- A sock, with a wire, so you can tunnel all you desire.☆295Jan 19, 2024Updated 2 years ago
- ☆15Aug 22, 2022Updated 3 years ago
- ☆18Feb 1, 2026Updated last month
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- ☆57Aug 28, 2023Updated 2 years ago
- ☆90Jun 18, 2023Updated 2 years ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆568Jun 5, 2023Updated 2 years ago