DPAPILAB Next Gen, script collection
☆96Aug 26, 2022Updated 3 years ago
Alternatives and similar repositories for dpapilab-ng
Users that are interested in dpapilab-ng are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Jun 27, 2024Updated last year
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆20Jun 20, 2024Updated last year
- ☆176Mar 31, 2026Updated last month
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 8 months ago
- DPAPI looting remotely and locally in Python☆549Mar 13, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆75Mar 27, 2026Updated last month
- ☆108Feb 11, 2026Updated 2 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆68Jan 10, 2025Updated last year
- Dumping DPAPI credz remotely☆1,367Mar 24, 2025Updated last year
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆72Mar 8, 2026Updated 2 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 10 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆21Jul 15, 2025Updated 9 months ago
- ☆235Oct 8, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Test AMSI Provider implementation in C#☆45Dec 18, 2024Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆60Jul 23, 2025Updated 9 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆350Nov 19, 2024Updated last year
- Proof-of-concept tools for my AD Forest trust research☆235Jun 10, 2024Updated last year
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆58Jul 13, 2025Updated 9 months ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆175Sep 3, 2025Updated 8 months ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆53Apr 25, 2026Updated last week
- CLI tool to interact with the BloodHound CE API☆73Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ClickForClickOnce - Generate configurable clickonce payloads☆93Apr 17, 2026Updated 3 weeks ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆129Jan 17, 2026Updated 3 months ago
- ☆246May 5, 2024Updated 2 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 3 months ago
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆166Apr 17, 2025Updated last year
- ☆26Mar 11, 2025Updated last year
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆741Sep 3, 2025Updated 8 months ago
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆206Feb 11, 2026Updated 2 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Recovering NTLM hashes from Credential Guard☆384Dec 26, 2022Updated 3 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- Local & remote Windows DLL Proxying☆174Jun 17, 2024Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆157Nov 2, 2025Updated 6 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆148Jul 17, 2025Updated 9 months ago
- Info on how to use Kerberos KDC on a non-domain joined host☆54Jul 31, 2024Updated last year
- ☆30Aug 19, 2020Updated 5 years ago