Collection of powershell scripts I used to complete my CARTP and CARTE courses.
☆49Feb 27, 2026Updated 2 months ago
Alternatives and similar repositories for CARTX
Users that are interested in CARTX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- ☆26Aug 11, 2025Updated 8 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- Golang Automation Framework for Cobalt Strike using the Rest API☆59Apr 10, 2026Updated 3 weeks ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆58Jul 13, 2025Updated 9 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆35Apr 16, 2026Updated 2 weeks ago
- LDAP Enumeration Tool for Pentesters☆47Apr 22, 2025Updated last year
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆158Jan 25, 2026Updated 3 months ago
- a minimalistic winrm client written in python☆39Apr 17, 2026Updated 2 weeks ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆46Sep 25, 2024Updated last year
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 8 months ago
- C++ Reflective Assembly Loader☆32Mar 7, 2025Updated last year
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 7 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 8 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- PowerShell & Python tools developed for CTFs and certification exams☆71Aug 10, 2025Updated 8 months ago
- Manage and maintain Defender XDR custom collection configuration☆35Nov 19, 2025Updated 5 months ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆25Jan 19, 2026Updated 3 months ago
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024☆39Oct 20, 2025Updated 6 months ago
- ☆13Jan 15, 2026Updated 3 months ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆50Apr 1, 2026Updated last month
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated last year
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆23Nov 24, 2025Updated 5 months ago
- Automatically run and populate a new instance of BH CE☆121Jan 30, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A simple C++ Windows tool to get information about processes exposing named pipes.☆41Mar 6, 2025Updated last year
- ☆59Dec 10, 2025Updated 4 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆324Feb 16, 2026Updated 2 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆640May 8, 2025Updated 11 months ago
- ☆44Apr 15, 2026Updated 2 weeks ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆399Sep 26, 2025Updated 7 months ago
- Azure apim mini proxy☆56Feb 16, 2026Updated 2 months ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- Local SYSTEM auth trigger for relaying☆171Jul 22, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆21Sep 12, 2025Updated 7 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 6 months ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆46Feb 19, 2026Updated 2 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆83Sep 11, 2025Updated 7 months ago
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago