Skip to main content
GhostPack
GhostPack is a collection of security tools primarily authored by @harmj0y and the SpecterOps team. These tools should only be used in authorized security testing or educational environments.

Overview

GhostPack is a renowned collection of offensive security tools written primarily in C# for Windows and Active Directory environments. These tools assist security professionals in penetration testing, red teaming, and security auditing, covering everything from Kerberos attacks to credential extraction and privilege escalation.

18+ Repositories

Comprehensive suite of specialized security utilities

C# / .NET

Built on .NET Framework for Windows environments

Active Development

Regularly updated with new features and improvements

Open Source

Community-driven with contributions from security researchers

πŸ“– Fully Documented Tools

These GhostPack tools have comprehensive documentation available in this wiki:

🎭 Kerberos & Authentication

πŸ” Credential Access & Extraction

πŸ” Enumeration & Reconnaissance


πŸ› οΈ Additional GhostPack Tools

The following tools are part of the GhostPack collection. Full documentation coming soon:

Credential & Certificate Tools

Utility Tools

Deprecated Tools

SharpRoast was a C# port of PowerView’s Kerberoasting functionality. This functionality has been superseded by Rubeus, which provides more comprehensive Kerberos attack capabilities.Use Rubeus kerberoast instead.

Research & POC Tools


🎯 Tools by Use Case

  • Initial Access
  • Execution & Lateral Movement
  • Persistence
  • Privilege Escalation
  • Credential Access
  • Discovery
Credential Harvesting:
  • SharpDPAPI - Extract saved credentials
  • SafetyKatz - Dump credentials from memory
  • KeeThief - Extract KeePass master keys

πŸš€ Getting Started

1

Choose Your Tool

Select the appropriate tool for your assessment needs from the categories above
2

Review Documentation

Read the comprehensive documentation for each tool (links in the tool cards)
3

Obtain or Build

Option 1: Clone and Build
git clone https://github.com/ghostpack-docs/[TOOL_NAME]
cd [TOOL_NAME]
Open in Visual Studio and build, or use .NET CLI:
dotnet build
Option 2: Pre-compiled BinariesPre-compiled binaries may be available from community repositories
4

Review OPSEC Considerations

Each tool has detection considerations documented. Review before operational use.
5

Execute with Authorization

Only use tools during authorized penetration tests or in controlled lab environments

πŸŽ“ Learning Resources


⚠️ Operational Security

Detection ConsiderationsAll GhostPack tools generate telemetry that can be detected by EDR, SIEM, and other security monitoring solutions. Review the detection sections in each tool’s documentation before operational use.
Common Detection Vectors:
  • Process Creation: C# executable launches
  • Command Line: Tool-specific arguments and parameters
  • Network Traffic: Kerberos requests, WMI connections
  • Registry Access: Service queries, autorun enumeration
  • File System: DPAPI blob reads, credential file access
  • Memory Operations: LSASS access, process injection
  • Windows Events: Security logs, Sysmon, PowerShell logging
OPSEC Recommendations:
  • Use tools from memory when possible
  • Consider obfuscation for critical operations
  • Space out enumeration activities
  • Blend with normal admin activity patterns
  • Review tool-specific OPSEC guidance in documentation

🀝 Contributing

GhostPack welcomes contributions from the security community:
1

Fork Repository

Fork the specific tool repository you want to contribute to
2

Create Feature Branch

git checkout -b feature/your-improvement
3

Make Changes

Implement your improvements following the project’s coding standards
4

Test Thoroughly

Test your changes in multiple environments
5

Submit Pull Request

Submit a PR with clear description of changes and testing performed

πŸ‘₯ Credits

GhostPack tools are developed and maintained by: Primary Authors: Organization:
  • SpecterOps - Offensive security research and operations
Community:
  • Numerous contributors from the security community
  • Issue reporters and testers
  • Documentation contributors

πŸ“ License

Most GhostPack tools are released under the BSD 3-Clause License. Check individual repositories for specific licensing information.
For the latest updates, new tool releases, and announcements, follow the GhostPack GitHub organization and @harmj0y on Twitter.