Skip to content
View p0dalirius's full-sized avatar
🦋
🦋

Sponsors

@mxrch
@Zamanry
Private Sponsor

Highlights

  • Pro

Block or report p0dalirius

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
27 stars written in C#
Clear filter

a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )

C# 2,784 270 Updated Feb 27, 2026

Directory Services Internals (DSInternals) PowerShell Module and Framework

C# 1,929 280 Updated Mar 28, 2026

Run PowerShell with rundll32. Bypass software restrictions.

C# 1,822 258 Updated Mar 17, 2021

Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS

C# 1,651 243 Updated Oct 11, 2018

CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.

C# 1,398 320 Updated Dec 16, 2021

A .net OLE/COM viewer and inspector to merge functionality of OleView and Test Container

C# 1,385 198 Updated Dec 9, 2024

PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as well.

C# 1,109 152 Updated May 29, 2024

PoCs and tools for investigation of Windows process execution techniques

C# 955 148 Updated Feb 2, 2026

Framework for Kerberos relaying

C# 945 132 Updated May 29, 2022

Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.

C# 938 121 Updated Nov 11, 2024

Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!

C# 914 72 Updated Oct 30, 2025

SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Directory Web Services (ADWS) protocol.

C# 866 92 Updated Feb 3, 2024

Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).

C# 822 129 Updated Dec 14, 2023

Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)

C# 792 161 Updated Feb 9, 2022

Dump Azure AD Connect credentials for Azure AD and Active Directory

C# 787 98 Updated Aug 26, 2025

Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework

C# 638 95 Updated May 8, 2025

Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).

C# 589 61 Updated Mar 19, 2024

A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other objects in the domain.

C# 484 80 Updated Oct 14, 2022

A language where the code is written with folders

C# 387 19 Updated Dec 20, 2021

C# based evtx parser with lots of extras

C# 352 67 Updated Sep 4, 2025

Local privilege escalation from SeImpersonatePrivilege using EfsRpc.

C# 343 46 Updated Oct 17, 2022

PoC to coerce authentication from Windows hosts using MS-WSP

C# 304 40 Updated Sep 7, 2023

A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses …

C# 167 22 Updated Nov 2, 2025

Lnk crafting and research tools

C# 160 8 Updated Mar 4, 2026

Common library used by SharpHound.

C# 101 55 Updated Apr 14, 2026