PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via Microsoft Graph, recursively downloads files, and logs every Graph + SharePoint HTTP request for SIEM correlation, detection engineering, and IR testing.
☆162Jan 25, 2026Updated 3 months ago
Alternatives and similar repositories for SharePointDumper
Users that are interested in SharePointDumper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆162May 4, 2026Updated 2 weeks ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated last year
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 5 months ago
- Enumerate active EDR's on the system☆154Sep 23, 2025Updated 7 months ago
- A practical client for ADWS in Golang.☆52Mar 3, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆31Feb 12, 2026Updated 3 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 4 months ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆58Jul 2, 2025Updated 10 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆133Feb 17, 2026Updated 3 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 8 months ago
- a BOF implementation of various registry persistence methods☆97Nov 11, 2025Updated 6 months ago
- Microsoft Network Service Fingerprinting Tool☆70Jan 2, 2026Updated 4 months ago
- ☆18Feb 29, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆62Mar 1, 2026Updated 2 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆32Dec 20, 2025Updated 5 months ago
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆49Feb 27, 2026Updated 2 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆269Apr 8, 2025Updated last year
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆35May 3, 2026Updated 2 weeks ago
- .NET tool used to enrich RPC telemetry☆102Jan 24, 2026Updated 3 months ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated 3 months ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆13May 7, 2025Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆53May 16, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆101Dec 23, 2025Updated 4 months ago
- This will be the repo for the BTHb.☆29May 9, 2026Updated last week
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆84Dec 15, 2025Updated 5 months ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 11 months ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆30Aug 4, 2025Updated 9 months ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆89Apr 21, 2026Updated 3 weeks ago
- A C# tool for extracting information from SCCM PXE boot media.☆53Jan 14, 2026Updated 4 months ago
- ☆110Feb 14, 2026Updated 3 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 5 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆143Sep 9, 2025Updated 8 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 3 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆167Jun 19, 2025Updated 11 months ago
- ☆30Aug 19, 2020Updated 5 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Mar 27, 2025Updated last year
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024☆39Oct 20, 2025Updated 7 months ago