Multiplayer pivoting solution
β489Mar 7, 2026Updated this week
Alternatives and similar repositories for ligolo-mp
Users that are interested in ligolo-mp are comparing it to the libraries listed below
Sorting:
- Active Directory data ingestor for BloodHound Community Edition written in Rust. π¦β460Jan 15, 2026Updated last month
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Frameworkβ638May 8, 2025Updated 10 months ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. π¦β1,131Oct 21, 2024Updated last year
- Powerview on steroidsβ890Updated this week
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinelβ364Jan 29, 2026Updated last month
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.β261Nov 22, 2025Updated 3 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Direβ¦β863Feb 3, 2024Updated 2 years ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.β4,325Feb 15, 2026Updated 3 weeks ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accountsβ170Jun 29, 2025Updated 8 months ago
- Weaponizing DCOM for NTLM Authentication Coercionsβ274Jul 1, 2025Updated 8 months ago
- Make everyone in your VLAN ASRep roastableβ248Oct 7, 2025Updated 5 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.β186Mar 14, 2025Updated 11 months ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)β701May 7, 2025Updated 10 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.β¦β892Updated this week
- BloodyAD is an Active Directory Privilege Escalation Frameworkβ2,102Feb 27, 2026Updated last week
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.β261Feb 21, 2025Updated last year
- Windows remote execution multitoolβ784Updated this week
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,199Jan 5, 2026Updated 2 months ago
- Fileless atexec, no more need for port 445β406Mar 28, 2024Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.β1,266Dec 9, 2025Updated 3 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.β1,019Feb 1, 2026Updated last month
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection sβ¦β471May 16, 2024Updated last year
- ForsHopsβ152Mar 25, 2025Updated 11 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to executionβ195Nov 27, 2024Updated last year
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitationβ399Jul 23, 2025Updated 7 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inteβ¦β1,317Nov 12, 2025Updated 3 months ago
- A Rust implementation of GodPotato β abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTAβ¦β354Apr 26, 2025Updated 10 months ago
- β208Dec 17, 2025Updated 2 months ago
- Dominate Active Directory with PowerShell.β1,166Nov 28, 2025Updated 3 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!β539May 9, 2025Updated 10 months ago
- Python implementation of GhostPack's Seatbelt situational awareness toolβ271Nov 12, 2024Updated last year
- The Network Execution Toolβ5,315Updated this week
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound dataβ359Jan 8, 2026Updated 2 months ago
- β160May 5, 2025Updated 10 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the β¦β1,823Nov 3, 2024Updated last year
- βοΈπ€« Stealth redirector for your red team operation securityβ1,067Mar 1, 2026Updated last week
- Active Directory Auditing and Enumerationβ521Dec 3, 2025Updated 3 months ago
- Tools for Kerberos PKINIT and relaying to AD CSβ882Jan 3, 2025Updated last year
- Enumerate Domain Users Without Authenticationβ282Apr 22, 2025Updated 10 months ago