Script related in Active Directory Attacks Domain
☆24Aug 19, 2023Updated 2 years ago
Alternatives and similar repositories for ADmon
Users that are interested in ADmon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- Ethical Hacking - A Hands-On Approach to Ethical Hacking [Video], published by Packt☆15May 10, 2023Updated 2 years ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 7 months ago
- A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning v…☆19Oct 8, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- My Notes about Penetration Testing☆732Jan 17, 2026Updated 2 months ago
- ☆11Aug 31, 2023Updated 2 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- Reconizer is all-in-one subdomain enumeration tool that has capabilities to find the maximum number of subdomains of a root domain.☆18Jul 14, 2024Updated last year
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated 2 years ago
- ☆13Dec 12, 2022Updated 3 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆41Jul 30, 2023Updated 2 years ago
- Simple web app to track OWASP WSTG security testing progress☆28Sep 12, 2025Updated 6 months ago
- ZHttp is a Kotlin-based, type-safe, asynchronous/synchronous, and thread-safe HTTP Client Library built for all JVM projects (Android, Sp…☆15Oct 5, 2024Updated last year
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- zwatcher is a lightweight bash script for monitoring sub/domains or a list of sub/domains and javascript files. It compares HTTP status c…☆21Nov 23, 2025Updated 4 months ago
- Modified version of Process monitor that bypasses procmon detection for anti-debuggers☆24May 6, 2024Updated last year
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆219Dec 28, 2022Updated 3 years ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Terraform provider that exposes HCL parsing and evaluation functionality☆10Dec 7, 2024Updated last year
- Terraform Azure Verified Resource Module for Network Security Group☆17Mar 18, 2026Updated 3 weeks ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- Detecting and Responding to Threats using Microsoft 365 Defender, published by Packt☆16Jul 10, 2023Updated 2 years ago
- A USB phishing evaluation platform☆46Oct 15, 2015Updated 10 years ago
- This is a cross platform dmg decryption tool. Maintained by quasarboi, but credit goes to its original owner.☆17Mar 29, 2015Updated 11 years ago
- ☆24Apr 30, 2023Updated 2 years ago
- inspect EntraID SCIM flows for troubleshooting☆30Nov 23, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypas…☆21May 4, 2025Updated 11 months ago
- ☆78Apr 25, 2023Updated 2 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Fast Path Traversal exploitation tool☆21Apr 19, 2024Updated last year
- Some handy bash scripts I used for the OSCP☆24Oct 1, 2022Updated 3 years ago
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- Terraforming AKS: Best Practices & Design Considerations☆15Mar 5, 2024Updated 2 years ago