Documentation of main privilege escalation vulnerabilities affecting Active Directory.
☆15Dec 6, 2025Updated 3 months ago
Alternatives and similar repositories for ad-cve-privesc
Users that are interested in ad-cve-privesc are comparing it to the libraries listed below
Sorting:
- Manage your sdks and emulators in a light and simplified way using a webui.☆13Jun 22, 2024Updated last year
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆28Aug 18, 2025Updated 6 months ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- making printf work for you☆15Nov 10, 2025Updated 3 months ago
- Automatially unzip files added to a specified directory☆14Mar 12, 2022Updated 3 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Des références pour se faire une culture de sécurité informatique.☆12Dec 19, 2024Updated last year
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆10Feb 1, 2021Updated 5 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- A collection of utility scripts and other tools that make working with Crabgrass easier.☆11Apr 3, 2020Updated 5 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432)☆10Mar 24, 2023Updated 2 years ago
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- Query LDAP and AD with SQL☆10Jun 17, 2021Updated 4 years ago
- An demonic library to write PE binaries☆11Feb 12, 2024Updated 2 years ago
- Powershell Scripts for DNS Functions☆11Jul 23, 2020Updated 5 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- oh no oh no this is not good very bad very good☆11Mar 8, 2023Updated 3 years ago
- Code with Windows Hacker☆12Oct 14, 2022Updated 3 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Sophos Central PowerShell module☆11Jul 11, 2023Updated 2 years ago
- Search-Registry: Find Keys, Value Names, and Value Data in the Registry☆11Jul 3, 2022Updated 3 years ago
- 一款用于记录终端软件使用时间的开发套件☆12Feb 26, 2022Updated 4 years ago
- Attempt to use WFP for proxy interception☆10Jan 13, 2019Updated 7 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- go版本机器学习框架☆10May 8, 2025Updated 10 months ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- KCP bindings for Rust☆10Feb 1, 2022Updated 4 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- fork from A-Protect☆10Nov 26, 2018Updated 7 years ago
- 黑客神器,谁用谁知道!☆10Jul 10, 2019Updated 6 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- ☆11Jul 11, 2023Updated 2 years ago