PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via Microsoft Graph, recursively downloads files, and logs every Graph + SharePoint HTTP request for SIEM correlation, detection engineering, and IR testing.
☆117Jan 25, 2026Updated last month
Alternatives and similar repositories for SharePointDumper
Users that are interested in SharePointDumper are comparing it to the libraries listed below
Sorting:
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆158Jan 3, 2026Updated 2 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 10 months ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 3 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 4 months ago
- Enumerate active EDR's on the system☆152Sep 23, 2025Updated 5 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆128Feb 17, 2026Updated last month
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆58Jul 2, 2025Updated 8 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- a BOF implementation of various registry persistence methods☆95Nov 11, 2025Updated 4 months ago
- ☆18Feb 29, 2024Updated 2 years ago
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆59Mar 1, 2026Updated 2 weeks ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆60Dec 15, 2025Updated 3 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆99Dec 23, 2025Updated 2 months ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 10 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆268Apr 8, 2025Updated 11 months ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated last month
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 10 months ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆78Mar 13, 2026Updated last week
- A C# tool for extracting information from SCCM PXE boot media.☆51Jan 14, 2026Updated 2 months ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 2 months ago
- ☆142Sep 9, 2025Updated 6 months ago
- Red Team tools containerized☆76Dec 6, 2025Updated 3 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 3 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- ☆55May 31, 2025Updated 9 months ago
- Extract the SAM and SYSTEM hives using the Volume Shadow Copy (VSS) API. With exfiltration and XOR obfuscation options. Implemented in C#…☆341Feb 2, 2026Updated last month
- LLM agent solving traces, leaderboards, and benchmark results across security CTF and hacking platforms☆53Updated this week
- ☆43Jul 17, 2025Updated 8 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆313Dec 29, 2025Updated 2 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 2 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆106Jul 23, 2025Updated 7 months ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆90Feb 16, 2026Updated last month
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆57Mar 7, 2026Updated last week
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 4 months ago
- ☆31Aug 13, 2025Updated 7 months ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆162Feb 2, 2026Updated last month