Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files
☆14Jan 10, 2026Updated last month
Alternatives and similar repositories for PowerDPAPI
Users that are interested in PowerDPAPI are comparing it to the libraries listed below
Sorting:
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆23Feb 26, 2026Updated last week
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- A PowerShell wrapper for certutil.exe☆20Feb 21, 2026Updated last week
- A cross-platform tool to work with Security Identifiers (SID) formats.☆15Jun 21, 2025Updated 8 months ago
- Repository for Ludus french templates☆21Updated this week
- Extract the Procedures (TTP) from CTI reports☆17Dec 13, 2025Updated 2 months ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆38Feb 27, 2026Updated last week
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- demo unhooking functions in ntdll☆28Jul 15, 2025Updated 7 months ago
- ☆20Nov 6, 2023Updated 2 years ago
- AI-based Ludus range configuration builder☆29May 6, 2025Updated 10 months ago
- ☆26Dec 21, 2025Updated 2 months ago
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆38Jul 23, 2025Updated 7 months ago
- AppContainer tools for launching sandboxed win32 apps, changing ACL permissions and learning from ETW traces.☆31May 4, 2025Updated 10 months ago
- Utilizng an MCP Server to communicate with your C2☆86May 15, 2025Updated 9 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 8 months ago
- A tiny tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆27May 28, 2025Updated 9 months ago
- ☆54Oct 13, 2025Updated 4 months ago
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated last month
- ☆42Nov 13, 2025Updated 3 months ago
- A small How-To on creating your own weaponized WSL file☆122Jul 23, 2025Updated 7 months ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆34Oct 3, 2024Updated last year
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Jul 29, 2025Updated 7 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- The AMSI server for Avred☆33Sep 15, 2023Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Jul 22, 2025Updated 7 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- Azure AD Password Checker☆86Jan 17, 2025Updated last year
- ☆39Oct 12, 2022Updated 3 years ago
- OAuth Device Code Phishing Toolkit☆112Feb 6, 2026Updated last month
- Secure NotebookLM MCP Server - Query Google NotebookLM from Claude/AI agents with 14 security hardening layers☆33Feb 25, 2026Updated last week
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- ☆14Dec 11, 2025Updated 2 months ago