Script related in Active Directory Attacks Domain
☆24Aug 19, 2023Updated 2 years ago
Alternatives and similar repositories for ADmon
Users that are interested in ADmon are comparing it to the libraries listed below
Sorting:
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 6 months ago
- A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning v…☆19Oct 8, 2025Updated 5 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- My Notes about Penetration Testing☆730Jan 17, 2026Updated 2 months ago
- JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE), CVE-2023-42793☆10Apr 24, 2024Updated last year
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Reconizer is all-in-one subdomain enumeration tool that has capabilities to find the maximum number of subdomains of a root domain.☆18Jul 14, 2024Updated last year
- ☆13Dec 12, 2022Updated 3 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- ☆40Jul 30, 2023Updated 2 years ago
- a medium scraper that you need.☆18Nov 11, 2025Updated 4 months ago
- Simple web app to track OWASP WSTG security testing progress☆27Sep 12, 2025Updated 6 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Dec 2, 2024Updated last year
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆218Dec 28, 2022Updated 3 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 4 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- MISP to Splunk Enterprise Security Theat Intelligence Framework Integration☆14Jul 11, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- A USB phishing evaluation platform☆46Oct 15, 2015Updated 10 years ago
- ☆24Apr 30, 2023Updated 2 years ago
- inspect EntraID SCIM flows for troubleshooting☆30Nov 23, 2025Updated 3 months ago
- This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypas…☆20May 4, 2025Updated 10 months ago
- ☆78Apr 25, 2023Updated 2 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Some handy bash scripts I used for the OSCP☆24Oct 1, 2022Updated 3 years ago
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- Writeups of Hack The Box machines, Italian and English languages☆15Mar 9, 2026Updated last week
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆105Dec 8, 2025Updated 3 months ago
- Mastering Identity and Access Management with Microsoft Azure-Second Edition, published by Packt☆18Feb 18, 2021Updated 5 years ago
- QR code Ghostmode☆25Jul 30, 2025Updated 7 months ago
- Capture WPA/WPA2 4-way handshake using BW16 (RTL8720dn)☆16Feb 22, 2026Updated last month
- Gradient Boosting Models on Real-Time Sensor Data for AI-Enhanced Vehicle Predictive Maintenance. By using a web-based interface to forec…☆19Nov 17, 2024Updated last year
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago