fully async implementation of Dirkjan's ROADTools
☆34Mar 15, 2025Updated last year
Alternatives and similar repositories for aroadtools
Users that are interested in aroadtools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Feb 19, 2026Updated last month
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆260May 10, 2023Updated 2 years ago
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 5 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Asynchronous NFSv3 client in pure Python☆29Jul 16, 2025Updated 8 months ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Abusing Azure services over C2☆368Jan 20, 2026Updated 2 months ago
- Get Fine Grained Password Policy☆78Mar 13, 2026Updated 3 weeks ago
- ☆16May 29, 2024Updated last year
- Nim Library for Offensive Security Development☆198Sep 4, 2023Updated 2 years ago
- ☆21Feb 1, 2026Updated 2 months ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆114Feb 13, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆29May 16, 2023Updated 2 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- ☆90Jun 18, 2023Updated 2 years ago
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆40Jun 17, 2025Updated 9 months ago
- Generate IDN homographs and phishing domains☆13Aug 21, 2023Updated 2 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆381Dec 23, 2025Updated 3 months ago
- A sock, with a wire, so you can tunnel all you desire.☆296Jan 19, 2024Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- wsnet☆26Mar 4, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆307Mar 15, 2025Updated last year
- ☆221Mar 26, 2024Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆127Mar 31, 2026Updated last week
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆205Nov 4, 2025Updated 5 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Windows Thread Pool Injection Havoc Implementation☆34Mar 23, 2024Updated 2 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated 2 months ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated 2 years ago
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆45Jun 1, 2025Updated 10 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago