PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via Microsoft Graph, recursively downloads files, and logs every Graph + SharePoint HTTP request for SIEM correlation, detection engineering, and IR testing.
☆113Jan 25, 2026Updated last month
Alternatives and similar repositories for SharePointDumper
Users that are interested in SharePointDumper are comparing it to the libraries listed below
Sorting:
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 10 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆154Jan 3, 2026Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 4 months ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆57Jul 2, 2025Updated 7 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆26Dec 20, 2025Updated 2 months ago
- Calling the undocumented DPAPI RPC interface directly, no more calling public CryptUnprotectData!☆75Feb 4, 2026Updated 3 weeks ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆37Nov 22, 2025Updated 3 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆99Dec 23, 2025Updated 2 months ago
- Enumerate active EDR's on the system☆150Sep 23, 2025Updated 5 months ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆58Updated this week
- ☆140Sep 9, 2025Updated 5 months ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 9 months ago
- ☆55May 31, 2025Updated 8 months ago
- a BOF implementation of various registry persistence methods☆94Nov 11, 2025Updated 3 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆313Dec 29, 2025Updated last month
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 3 months ago
- HIPAA-eligible DIY Twilio alternative for voice AI telephone applications. Uses Asterisk PBX and AWS Chime SIP trunking.☆17Jan 6, 2026Updated last month
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- ☆58Dec 10, 2025Updated 2 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆266Apr 8, 2025Updated 10 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Memory for Coding Agents☆27Feb 4, 2026Updated 3 weeks ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- ☆43Jul 17, 2025Updated 7 months ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆86Feb 16, 2026Updated last week
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- Extract the SAM and SYSTEM hives using the Volume Shadow Copy (VSS) API. With exfiltration and XOR obfuscation options. Implemented in C#…☆336Feb 2, 2026Updated 3 weeks ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 6 years ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated last week
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆58Dec 15, 2025Updated 2 months ago
- ☆14Apr 5, 2024Updated last year
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆84Feb 9, 2026Updated 2 weeks ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆116Feb 17, 2026Updated last week
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆357Jan 8, 2026Updated last month
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated 11 months ago