☆94Dec 9, 2025Updated 3 months ago
Alternatives and similar repositories for adexplorersnapshot-rs
Users that are interested in adexplorersnapshot-rs are comparing it to the libraries listed below
Sorting:
- ☆100Sep 1, 2024Updated last year
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- ☆160Jan 27, 2025Updated last year
- A BloodHound collector for Microsoft Configuration Manager☆392Jul 7, 2025Updated 8 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- ☆234Oct 8, 2024Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆237Aug 25, 2024Updated last year
- ☆65Mar 15, 2024Updated last year
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆384Apr 26, 2025Updated 10 months ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆26May 6, 2025Updated 10 months ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆460Jan 15, 2026Updated last month
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆382Dec 13, 2024Updated last year
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆336Aug 7, 2024Updated last year
- ☆215Mar 26, 2024Updated last year
- Library of BOFs to interact with SQL servers☆223Dec 3, 2025Updated 3 months ago
- COFF file (BOF) for managing Kerberos tickets.☆320Jul 2, 2023Updated 2 years ago
- Tool to remotely dump secrets from the Windows registry☆522Feb 27, 2026Updated last week
- ☆242May 5, 2024Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆677Aug 15, 2025Updated 6 months ago
- ☆137Feb 11, 2025Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆261Nov 22, 2025Updated 3 months ago
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆234Feb 12, 2025Updated last year
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,055Jan 22, 2026Updated last month
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆863Feb 3, 2024Updated 2 years ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆211Jun 10, 2024Updated last year
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Apr 27, 2024Updated last year
- psexecsvc - a python implementation of PSExec's native service implementation☆238Feb 11, 2025Updated last year
- Our Tips&Tricks☆145Updated this week
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆260Aug 13, 2024Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆276Apr 17, 2023Updated 2 years ago
- ☆126Sep 1, 2024Updated last year
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆210Jan 6, 2026Updated 2 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- ☆291Jul 20, 2023Updated 2 years ago
- Sleep obfuscation☆270Dec 13, 2024Updated last year
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆464Aug 17, 2024Updated last year