toneillcodes / PowerDPAPIView external linksLinks
Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files
☆14Jan 10, 2026Updated last month
Alternatives and similar repositories for PowerDPAPI
Users that are interested in PowerDPAPI are comparing it to the libraries listed below
Sorting:
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 7 months ago
- A PowerShell wrapper for certutil.exe☆17Dec 28, 2025Updated last month
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆22Dec 31, 2025Updated last month
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆16Jun 11, 2024Updated last year
- Repository for Ludus french templates☆21Jan 17, 2026Updated 3 weeks ago
- A cross-platform tool to work with Security Identifiers (SID) formats.☆15Jun 21, 2025Updated 7 months ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- Extract the Procedures (TTP) from CTI reports☆15Dec 13, 2025Updated 2 months ago
- demo unhooking functions in ntdll☆28Jul 15, 2025Updated 6 months ago
- ☆20Nov 6, 2023Updated 2 years ago
- ☆24Dec 21, 2025Updated last month
- AI-based Ludus range configuration builder☆29May 6, 2025Updated 9 months ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆35Jul 23, 2025Updated 6 months ago
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated 11 months ago
- AppContainer tools for launching sandboxed win32 apps, changing ACL permissions and learning from ETW traces.☆30May 4, 2025Updated 9 months ago
- Utilizng an MCP Server to communicate with your C2☆86May 15, 2025Updated 8 months ago
- A tiny tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆27May 28, 2025Updated 8 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Oct 14, 2024Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 7 months ago
- ☆54Oct 13, 2025Updated 4 months ago
- A python library to create BloodHound OpenGraphs☆52Feb 4, 2026Updated last week
- ☆42Nov 13, 2025Updated 3 months ago
- A small How-To on creating your own weaponized WSL file☆119Jul 23, 2025Updated 6 months ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆33Oct 3, 2024Updated last year
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Jul 29, 2025Updated 6 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated 11 months ago
- The AMSI server for Avred☆33Sep 15, 2023Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Jul 22, 2025Updated 6 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42May 31, 2024Updated last year
- Azure AD Password Checker☆86Jan 17, 2025Updated last year
- OAuth Device Code Phishing Toolkit☆109Feb 6, 2026Updated last week
- ☆39Oct 12, 2022Updated 3 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51May 16, 2025Updated 8 months ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆38Jan 12, 2026Updated last month
- ☆75Feb 3, 2026Updated last week
- ☆14Dec 11, 2025Updated 2 months ago