☆11Feb 7, 2023Updated 3 years ago
Alternatives and similar repositories for ADFSpoof
Users that are interested in ADFSpoof are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆64Jun 30, 2022Updated 3 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- dcsync bof☆50Feb 13, 2026Updated 2 months ago
- D/Invoke standalone shellcode runners☆40Nov 23, 2023Updated 2 years ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Small template engine☆12Nov 13, 2024Updated last year
- Explosive Steganography tools and presentation (as given at the HOPE number 9 conference)☆21Feb 7, 2014Updated 12 years ago
- ☆18Jun 25, 2024Updated last year
- Rust bindings to Microsoft Windows users / groups management API☆35Dec 27, 2025Updated 3 months ago
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Sep 15, 2023Updated 2 years ago
- Gitbook: OSCP-Jewels☆12Oct 19, 2021Updated 4 years ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆46Aug 30, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- An offensive security framework for writing payloads☆17Sep 13, 2022Updated 3 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Jan 1, 2023Updated 3 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆30Nov 6, 2022Updated 3 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- Attack chain emulator. Write recipes for initial access easily☆22Feb 26, 2025Updated last year
- ☆14Jul 26, 2025Updated 8 months ago
- Kerberos parser written in rust with nom☆15Nov 24, 2025Updated 4 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆18Oct 27, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python based WinDbg script to automate the search for code caves in binaries and libraries.☆57Jan 5, 2025Updated last year
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Multi-agent system (MAS) hijacking demos☆45Updated this week
- Windows x64 Exploitation Training☆16May 30, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆21Dec 1, 2021Updated 4 years ago
- Werkzeug password cracker☆19Nov 14, 2024Updated last year
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆25Apr 1, 2020Updated 6 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago
- ☆14Nov 1, 2023Updated 2 years ago
- ☆11Mar 19, 2019Updated 7 years ago