CLI monitor for windows process- & file activity
☆97Nov 20, 2020Updated 5 years ago
Alternatives and similar repositories for winpspy
Users that are interested in winpspy are comparing it to the libraries listed below
Sorting:
- SeManageVolumePrivilege to SYSTEM☆150Nov 22, 2023Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆135Oct 8, 2021Updated 4 years ago
- A small reverse shell for Linux & Windows☆619Jun 5, 2024Updated last year
- generate payloads that force authentication against an attacker machine☆120Nov 6, 2022Updated 3 years ago
- rcat☆74Mar 7, 2022Updated 4 years ago
- vulnerable windows binaries for exploitation practice☆47Jun 6, 2022Updated 3 years ago
- ☆62Jul 9, 2023Updated 2 years ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Nov 2, 2025Updated 4 months ago
- ☆185May 29, 2023Updated 2 years ago
- Simple AV Evasion for PE Files☆41Nov 21, 2021Updated 4 years ago
- a minimalistic winrm client written in python☆25Mar 6, 2026Updated 2 weeks ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆64Jun 30, 2022Updated 3 years ago
- PowerShell Constrained Language Mode Bypass☆295Jan 31, 2021Updated 5 years ago
- Decrypt SCCM and DPAPI secrets with Powershell.☆45Jun 24, 2025Updated 8 months ago
- ☆64Jan 2, 2024Updated 2 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆864Feb 14, 2026Updated last month
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆364Feb 12, 2024Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- Simple C# implementation of PowerUpSQL☆95Jul 8, 2024Updated last year
- In-depth ldap enumeration utility☆567Mar 4, 2026Updated 2 weeks ago
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- Impersonating authentication over HTTP and/or named pipes.☆144Apr 2, 2021Updated 4 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆51Nov 15, 2023Updated 2 years ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆401Jan 14, 2026Updated 2 months ago
- Powerview on steroids☆903Mar 10, 2026Updated last week
- List of HTB v4 APIs☆16Oct 19, 2024Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- ☆234Oct 8, 2024Updated last year
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆622Aug 15, 2025Updated 7 months ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- ☆63May 31, 2024Updated last year
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆786Updated this week