This is an Active Directory Pentesting Lab created by me which includes attacks like IPV6 DNS takeover, Smb relay, unconstrained delegation, RBCD, ACLs, Certificates (ESC1, ESC4,ESC8), Webclient Workstation takeover etc.
☆23Jan 23, 2024Updated 2 years ago
Alternatives and similar repositories for Active-Directory-Penetration-Testing-Lab
Users that are interested in Active-Directory-Penetration-Testing-Lab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 11 months ago
- Julia rules for semgrep☆14Dec 9, 2025Updated 5 months ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated 2 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Jul 21, 2024Updated last year
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- Collection of red team scripts, resources & configs.☆15Feb 14, 2026Updated 2 months ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- ☆68Apr 21, 2026Updated 2 weeks ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆43Apr 1, 2026Updated last month
- Azure PowerShell Scripts for Compute, Virtual Machines, Networking, Storage, Disks and Resource Groups.☆17Sep 24, 2024Updated last year
- Security Operation Center Lab☆21Oct 8, 2024Updated last year
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Overflowme is a walkthrough to learn the basics of binary exploitation. Detailed instructions, stack diagrams and fully commented assembl…☆71Apr 30, 2025Updated last year
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆24Oct 4, 2021Updated 4 years ago
- ☆18Dec 20, 2025Updated 4 months ago
- ☆24Sep 6, 2025Updated 8 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆321Dec 29, 2025Updated 4 months ago
- This is Web Application Penetration Testing Report made for everybody who wanted a glance of how to make a professional report for pentet…☆18Sep 3, 2021Updated 4 years ago
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆14Jan 24, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is a Python script that generates a staged payload that fully bypasses MS Defender. Can potentially be used for EDRs with some custo…☆77Mar 31, 2026Updated last month
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- Deception implementation through analysis of BloodHound data☆58Mar 30, 2026Updated last month
- KQL Queries☆39May 1, 2026Updated last week
- Python program to exploit stack-based buffer overflows.☆22Feb 24, 2021Updated 5 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆33Aug 26, 2024Updated last year
- List of HTB v4 APIs☆16Oct 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Model Context Protocol (MCP) server for automating Ludus v1 and v2 cyber range environments through AI assistants. 190+ tools for range…☆79Mar 26, 2026Updated last month
- ICS Security Labs☆39Mar 27, 2021Updated 5 years ago
- ☆63Mar 15, 2026Updated last month
- ☆27Mar 6, 2025Updated last year
- Active Directory Pentesting Full Course - Red Team Hacking☆31Dec 13, 2021Updated 4 years ago
- This repository contains my preparation notes for CRTP and Red Teaming, focused on Active Directory attacks and defenses.☆86Jan 31, 2025Updated last year
- List of Command&Control (C2) software☆50Nov 11, 2022Updated 3 years ago