Active Directory Wordlists
☆112May 28, 2020Updated 5 years ago
Alternatives and similar repositories for Active-Directory-Wordlists
Users that are interested in Active-Directory-Wordlists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to perform Kerberos pre-auth bruteforcing☆3,279Aug 20, 2024Updated last year
- ☆39Jul 1, 2023Updated 2 years ago
- Trying to tame the three-headed dog.☆4,935Nov 14, 2025Updated 4 months ago
- ☆1,160Apr 21, 2021Updated 4 years ago
- ☆221Jul 20, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,380Apr 23, 2025Updated 11 months ago
- Create a list of possible usernames for bruteforcing☆83Feb 18, 2024Updated 2 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,206Sep 10, 2020Updated 5 years ago
- C# implementation of harmj0y's PowerView☆47Mar 22, 2020Updated 6 years ago
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆27Mar 13, 2023Updated 3 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆29Jan 11, 2023Updated 3 years ago
- Mindmap for OWASP Top 10 LLM Application and Relationship between them☆14Dec 11, 2024Updated last year
- 目前通过自学已经取得 OSCP(Offensive Security Certified Professional)证书,本项目用于记录、分享、交流。☆11Aug 16, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Welcome! This is where I'll post updates to projects I'm working on, walkthroughs to capture the flag material and any other areas of res…☆50May 4, 2021Updated 4 years ago
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- Weaponized VSCode Extensions☆15Feb 22, 2026Updated last month
- Tool to audit and attack LAPS environments☆930Jan 31, 2018Updated 8 years ago
- ☆26Apr 30, 2020Updated 5 years ago
- A collection of various capture the flag event write-ups and anomalies☆42Jun 8, 2019Updated 6 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,512Jan 10, 2025Updated last year
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,555Feb 20, 2026Updated last month
- Detections for CVE-2021-44228 inside of nested binaries☆35Dec 18, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆277Oct 9, 2023Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,877Sep 6, 2023Updated 2 years ago
- ☆221Jul 26, 2020Updated 5 years ago
- Various *nix tools built as statically-linked binaries☆3,641Aug 21, 2023Updated 2 years ago
- Starkiller is a Frontend for PowerShell Empire.☆1,643Mar 3, 2026Updated 3 weeks ago
- ☆2,748Aug 7, 2024Updated last year
- Word List (Palavras) para testes de intrusão focados no mercado BR☆10May 6, 2025Updated 10 months ago
- Test tool for CVE-2020-1472☆37Jul 1, 2023Updated 2 years ago
- Burp request/response timer☆36Nov 8, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A repository for maintaining a list of the top domains based on multiple lists☆23May 1, 2022Updated 3 years ago
- ☆54Jun 1, 2024Updated last year
- Proof of Concept for CVE-2019-18634☆237Sep 12, 2021Updated 4 years ago
- Scripts I created to pass the OSCP☆22Jul 23, 2021Updated 4 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,805Apr 25, 2024Updated last year
- The ultimate WinRM shell for hacking/pentesting☆5,306Mar 10, 2026Updated 2 weeks ago