Script related in Active Directory Attacks Domain
☆24Aug 19, 2023Updated 2 years ago
Alternatives and similar repositories for ADmon
Users that are interested in ADmon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jan 19, 2023Updated 3 years ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆31Aug 28, 2025Updated 8 months ago
- A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning v…☆19Oct 8, 2025Updated 7 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- My Notes about Penetration Testing☆734Jan 17, 2026Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated 2 years ago
- Reconizer is all-in-one subdomain enumeration tool that has capabilities to find the maximum number of subdomains of a root domain.☆18Jul 14, 2024Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- ☆14Dec 12, 2022Updated 3 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- ☆43Jul 30, 2023Updated 2 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆218Dec 28, 2022Updated 3 years ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆109Apr 11, 2026Updated last month
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Terraform provider that exposes HCL parsing and evaluation functionality☆10Dec 7, 2024Updated last year
- MISP to Splunk Enterprise Security Theat Intelligence Framework Integration☆14Jul 11, 2023Updated 2 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆40Feb 4, 2026Updated 3 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- Detecting and Responding to Threats using Microsoft 365 Defender, published by Packt☆16Jul 10, 2023Updated 2 years ago
- A USB phishing evaluation platform☆46Oct 15, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This is a cross platform dmg decryption tool. Maintained by quasarboi, but credit goes to its original owner.☆17Mar 29, 2015Updated 11 years ago
- ☆24Apr 30, 2023Updated 3 years ago
- This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypas…☆20May 4, 2025Updated last year
- ☆78Apr 25, 2023Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Codebase for EnterpriseOps-Gym from ServiceNow☆91May 8, 2026Updated last week
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 6 years ago
- Some handy bash scripts I used for the OSCP☆25Oct 1, 2022Updated 3 years ago
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Writeups of Hack The Box machines, Italian and English languages☆15Mar 9, 2026Updated 2 months ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Terraforming AKS: Best Practices & Design Considerations☆15Mar 5, 2024Updated 2 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Mastering Identity and Access Management with Microsoft Azure-Second Edition, published by Packt☆18Feb 18, 2021Updated 5 years ago
- Capture WPA/WPA2 4-way handshake using BW16 (RTL8720dn)☆17Feb 22, 2026Updated 2 months ago
- KQL Detections for Microsoft Sentinel and Microsoft 365 Defender☆21Nov 15, 2024Updated last year