PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via Microsoft Graph, recursively downloads files, and logs every Graph + SharePoint HTTP request for SIEM correlation, detection engineering, and IR testing.
☆155Jan 25, 2026Updated 3 months ago
Alternatives and similar repositories for SharePointDumper
Users that are interested in SharePointDumper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆162Jan 3, 2026Updated 3 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated last year
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 5 months ago
- A practical client for ADWS in Golang.☆50Mar 3, 2026Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆58Jul 2, 2025Updated 9 months ago
- Enumerate active EDR's on the system☆153Sep 23, 2025Updated 7 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆129Feb 17, 2026Updated 2 months ago
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 3 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 8 months ago
- a BOF implementation of various registry persistence methods☆97Nov 11, 2025Updated 5 months ago
- ☆18Feb 29, 2024Updated 2 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆62Mar 1, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆49Feb 27, 2026Updated 2 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 4 months ago
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆35Apr 16, 2026Updated 2 weeks ago
- .NET tool used to enrich RPC telemetry☆102Jan 24, 2026Updated 3 months ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆76Dec 15, 2025Updated 4 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆101Dec 23, 2025Updated 4 months ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆13May 7, 2025Updated 11 months ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated 2 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆53May 16, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Proof-of-concept implementation of AI-enabled postex DLLs☆71Sep 10, 2025Updated 7 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆269Apr 8, 2025Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 10 months ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆30Aug 4, 2025Updated 8 months ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆85Apr 21, 2026Updated last week
- A C# tool for extracting information from SCCM PXE boot media.☆52Jan 14, 2026Updated 3 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 2 months ago
- ☆142Sep 9, 2025Updated 7 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆166Jun 19, 2025Updated 10 months ago
- ☆30Aug 19, 2020Updated 5 years ago
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 10 months ago
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024☆39Oct 20, 2025Updated 6 months ago
- Analyze secretsdump output and hashcat potfiles to find shared passwords and weak credentials in Active Directory☆37Apr 4, 2026Updated 3 weeks ago
- ☆54May 31, 2025Updated 10 months ago