Post-exploitation tool for attacking Active Directory domain controllers
☆18Dec 18, 2022Updated 3 years ago
Alternatives and similar repositories for ADThief
Users that are interested in ADThief are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Basic packer using XOR encryption☆31Mar 29, 2024Updated last year
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆66Aug 29, 2023Updated 2 years ago
- Strut package for YunoHost☆10Jul 18, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Windows Defender Bypass for Cobalt Strike v4.0 Powershell Payload☆10Aug 29, 2020Updated 5 years ago
- Some simple scripts for decrypting passwords retrieved from a Manage Engine OpManager installation☆11Jan 28, 2016Updated 10 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- ☆13Oct 21, 2023Updated 2 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆15Apr 26, 2021Updated 4 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Jul 12, 2021Updated 4 years ago
- Offensive tool for Active Directory reconnaissance☆12Jan 28, 2026Updated last month
- Deploy your own lab of web application penetration testing with docker and docker-compose, webgoat, dvwap, bwapp and Juice Shop☆74Aug 20, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 3 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆57Jan 27, 2020Updated 6 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Dec 11, 2020Updated 5 years ago
- Process Hollowing demonstration & explanation☆36Feb 25, 2021Updated 5 years ago
- Snippets of scripting randomness☆13Jun 9, 2022Updated 3 years ago
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Jun 8, 2017Updated 8 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Jul 21, 2021Updated 4 years ago
- Play Doh Windows ACL Tools☆64Sep 7, 2022Updated 3 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Source code of my KeygenMe V7 challenge☆22Jul 19, 2018Updated 7 years ago
- Recreating and reviewing the Windows persistence methods☆39Nov 18, 2021Updated 4 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆57Jul 12, 2021Updated 4 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆17Feb 23, 2021Updated 5 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- C# Reflective loader for unmanaged binaries.☆446Jan 25, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆112Sep 8, 2024Updated last year
- Golng version of SharpDump that can be used to extract LSASS or any other proces. Provides token elevation prior to creating dump of high…☆21Oct 6, 2020Updated 5 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Oct 30, 2019Updated 6 years ago
- Windows CIFS/SMB packet generation and SMB networking library☆12Aug 25, 2020Updated 5 years ago
- EDR Evasion - Combination of SwampThing - TikiTorch☆29May 28, 2020Updated 5 years ago