Skip to content
View p0dalirius's full-sized avatar
🦋
🦋

Sponsors

@mxrch
@Zamanry
Private Sponsor

Highlights

  • Pro

Block or report p0dalirius

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
27 stars written in C#
Clear filter

a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )

C# 2,806 276 Updated Feb 27, 2026

Directory Services Internals (DSInternals) PowerShell Module and Framework

C# 1,936 280 Updated Mar 28, 2026

Run PowerShell with rundll32. Bypass software restrictions.

C# 1,821 258 Updated Mar 17, 2021

Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS

C# 1,656 242 Updated Oct 11, 2018

CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.

C# 1,400 320 Updated Dec 16, 2021

A .net OLE/COM viewer and inspector to merge functionality of OleView and Test Container

C# 1,394 199 Updated Dec 9, 2024

PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as well.

C# 1,115 151 Updated May 29, 2024

PoCs and tools for investigation of Windows process execution techniques

C# 957 148 Updated Feb 2, 2026

Framework for Kerberos relaying

C# 946 132 Updated May 29, 2022

Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.

C# 943 121 Updated Nov 11, 2024

Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!

C# 942 77 Updated Oct 30, 2025

SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Directory Web Services (ADWS) protocol.

C# 875 93 Updated Feb 3, 2024

Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).

C# 823 129 Updated Dec 14, 2023

Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)

C# 796 161 Updated Feb 9, 2022

Dump Azure AD Connect credentials for Azure AD and Active Directory

C# 791 98 Updated Aug 26, 2025

Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework

C# 640 95 Updated May 8, 2025

Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).

C# 593 61 Updated Mar 19, 2024

A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other objects in the domain.

C# 485 80 Updated Oct 14, 2022

A language where the code is written with folders

C# 387 19 Updated Dec 20, 2021

C# based evtx parser with lots of extras

C# 357 67 Updated Apr 28, 2026

Local privilege escalation from SeImpersonatePrivilege using EfsRpc.

C# 344 46 Updated Oct 17, 2022

PoC to coerce authentication from Windows hosts using MS-WSP

C# 305 40 Updated Sep 7, 2023

A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses …

C# 168 22 Updated Nov 2, 2025

Lnk crafting and research tools

C# 164 8 Updated Mar 4, 2026

Common library used by SharpHound.

C# 102 55 Updated Apr 29, 2026