Various AD tools needed for penetration testing in one place.
☆23Jul 13, 2023Updated 2 years ago
Alternatives and similar repositories for AD_Pentest_Bundle
Users that are interested in AD_Pentest_Bundle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C2 Infrastructure Automation☆120Jun 21, 2025Updated 9 months ago
- UAC Bypass using CMSTP in Rust☆36Dec 6, 2024Updated last year
- ☆52Feb 8, 2024Updated 2 years ago
- ☆15May 30, 2025Updated 9 months ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Automation scripts in preparation for PWK/OSCP labs☆17Sep 20, 2021Updated 4 years ago
- Process dumper wrote in rust.☆14Sep 16, 2024Updated last year
- This is a compiled cheatsheet from my experience of OSCP 2023 journey. Won't say it is all-rounded but a good starting point if you wanna…☆14Oct 17, 2024Updated last year
- ☆11Oct 7, 2022Updated 3 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- A Terraform framework for deploying to Oracle Cloud Infrastructure. This is the landing zone (starting point) for the framework.☆13Jan 21, 2025Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- Powershell modules and commands that come in handy for pentests and red team assessments.☆20Oct 31, 2018Updated 7 years ago
- ☆27Oct 1, 2025Updated 5 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- World CIDR IP lists☆10Jan 28, 2026Updated last month
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- A compendium of threat modeling and security testing resources for LLMs and GenAI agents☆18Oct 16, 2024Updated last year
- OSCP preparation☆12Sep 18, 2025Updated 6 months ago
- Hints for the Kusto Detective Agency - Season 2☆10Aug 15, 2023Updated 2 years ago
- List of Awesome Red Teaming Resources☆13Sep 2, 2021Updated 4 years ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- ☆12Feb 20, 2025Updated last year
- Filezilla local admin port exploit☆13Sep 13, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Powershell tools used for Red Team / Pentesting.☆81Jan 8, 2024Updated 2 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- Custom built Syntax Highlight tool for Word Documents☆27Sep 13, 2024Updated last year
- ☆12Oct 10, 2024Updated last year
- Statement on Codegate Qualifiers 2023☆11Jun 19, 2023Updated 2 years ago
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- Knowledge Management for Offensive Security Professionals Official Repository☆152Feb 25, 2025Updated last year
- ☆11Dec 17, 2023Updated 2 years ago
- A plugin to get our hackerone reports data into obsidian☆12Jan 28, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Sep 24, 2024Updated last year
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago
- ☆12Apr 5, 2025Updated 11 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆38Jun 12, 2024Updated last year
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago