☆24Apr 23, 2024Updated 2 years ago
Alternatives and similar repositories for Active-Directory-Penetration-Testing
Users that are interested in Active-Directory-Penetration-Testing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All about Active Directory pentesting☆171Dec 29, 2020Updated 5 years ago
- My notes containing the Certified Red Team Professional Course☆73Sep 7, 2024Updated last year
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆25Jun 18, 2023Updated 2 years ago
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆405Jun 15, 2023Updated 2 years ago
- A National Vulnerability Database (NVD) API query tool☆17Jun 27, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Explore and filter your GitHub starred repositories☆25Dec 5, 2023Updated 2 years ago
- ☆13Mar 23, 2023Updated 3 years ago
- ☆136Jul 3, 2023Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC☆17Feb 16, 2024Updated 2 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆22Aug 20, 2024Updated last year
- All in One Recon Tool for Bug Bounty☆16Dec 30, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆20Dec 8, 2023Updated 2 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- Tools used for Pentesting☆22Apr 21, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- hMailServer Password Decrypter☆12Nov 14, 2016Updated 9 years ago
- A curated list of FOSS software appliances for building a SOC☆18Jan 11, 2021Updated 5 years ago
- A curated list of Docker resources☆28Nov 13, 2015Updated 10 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆65Oct 16, 2024Updated last year
- Security Operation Center Lab☆21Oct 8, 2024Updated last year
- Some scripts to abuse kerberos using Powershell☆358Apr 10, 2026Updated 3 weeks ago
- Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend…☆41Sep 9, 2024Updated last year
- Internal Network Penetration Test Playbook☆20Jul 13, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- pinata-csrf-tool☆13Dec 20, 2019Updated 6 years ago
- Linux Shared Library to Shellcode Loader☆95Feb 15, 2026Updated 2 months ago
- webshells written with malice☆34Aug 30, 2017Updated 8 years ago
- List of Stuff I did to get through the OSCP :D☆352Dec 18, 2025Updated 4 months ago
- A pretty fast UDP port scanner☆14Feb 10, 2025Updated last year
- ☆18Aug 1, 2022Updated 3 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Oct 21, 2018Updated 7 years ago
- Precompiled binaries for various projects☆13Nov 6, 2020Updated 5 years ago
- Just some exploits :P☆47Jan 18, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A simple extension for https://intra.42.fr that shows how many days you have left before you get absorbed by the Blackhole.☆13Oct 21, 2022Updated 3 years ago
- Android Testing☆16Mar 24, 2014Updated 12 years ago
- ☆10Updated this week
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆60Sep 2, 2021Updated 4 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- Mac osx forensics tools☆12Nov 28, 2020Updated 5 years ago
- Realtime voice conversation with llm models using an asynchronous Voice to Text to Voice pipeline.☆20Aug 2, 2025Updated 9 months ago