☆38Jan 7, 2025Updated last year
Alternatives and similar repositories for adfstoolkit
Users that are interested in adfstoolkit are comparing it to the libraries listed below
Sorting:
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 7 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆65Jan 10, 2025Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- Vectored Exception Handling Squared☆31Dec 27, 2025Updated 2 months ago
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- RPC to WebClient startup☆57Aug 19, 2025Updated 7 months ago
- CVE-2024-40711-exp☆43Oct 17, 2024Updated last year
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 9 months ago
- ☆12Feb 19, 2026Updated last month
- ☆81Jan 26, 2025Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Command Augmentation support for BOFs and .NET assemblies across agents☆42Updated this week
- ☆26Nov 8, 2024Updated last year
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Updated this week
- ☆244May 5, 2024Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆195Feb 16, 2026Updated last month
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆140Jul 2, 2025Updated 8 months ago
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆117Oct 20, 2024Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆156Nov 2, 2025Updated 4 months ago
- A Mythic Agent written in PIC C.☆206Feb 4, 2025Updated last year
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- ☆136Feb 11, 2025Updated last year
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- ☆382Oct 17, 2025Updated 5 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆201Nov 4, 2025Updated 4 months ago
- Bof of RegPwn by MDSec☆72Mar 15, 2026Updated last week
- ☆126Sep 1, 2024Updated last year