Resources for AD penetration testing and security
☆33Feb 21, 2022Updated 4 years ago
Alternatives and similar repositories for Active-Directory-Penetration-Testing-and-Security
Users that are interested in Active-Directory-Penetration-Testing-and-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆103Nov 3, 2019Updated 6 years ago
- ☆242Aug 31, 2021Updated 4 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆47Sep 1, 2019Updated 6 years ago
- Research framework for reverse engineering and cheat prototyping in Counter-Strike 2. Developed as part of a Master’s Thesis at UC3M.☆53Mar 15, 2026Updated 2 weeks ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Repository for AsBuiltReport Microsoft DHCP module☆15Jan 31, 2026Updated last month
- Labs AZ-104 Azure Administrator☆19Jun 15, 2020Updated 5 years ago
- An active directory laboratory for penetration testing.☆151Dec 11, 2020Updated 5 years ago
- Scripts and piece of codes used for Active Directory configuration☆83Feb 14, 2023Updated 3 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆219Dec 28, 2022Updated 3 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- Active Directory Administration Cookbook, Second Edition, Published by Packt☆25Sep 20, 2023Updated 2 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 11 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 2 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆27Nov 11, 2020Updated 5 years ago
- A BOF for lazy people☆24Apr 4, 2024Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24May 8, 2022Updated 3 years ago
- Microsoft Cloud App Security labs☆14Dec 17, 2018Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Install popular tools used while pentesting & playing labs☆14Oct 8, 2021Updated 4 years ago
- Juniper Firewalls CVE-2023-36845 - RCE☆55Dec 29, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆44Dec 19, 2025Updated 3 months ago
- Convert an image to a sound clip. The spectrogram of the clip reproduces that image.☆26Jul 5, 2013Updated 12 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Mar 29, 2016Updated 10 years ago
- Zipper, a CobaltStrike file and folder compression utility.☆222Jan 18, 2020Updated 6 years ago
- results of scraping OneDrive from February 2022 - March 2025☆27Apr 29, 2025Updated 11 months ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- EP4: Build an Azure Lab with Terraform☆15Apr 25, 2023Updated 2 years ago
- All about Active Directory pentesting☆170Dec 29, 2020Updated 5 years ago
- Powerful WiFi Hacking penetration testing tools for Linux, designed for ethical hacking, security testing, and network auditing.☆16Nov 18, 2025Updated 4 months ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Dec 13, 2023Updated 2 years ago
- ssb=simple subdomain bruteforcer☆19Mar 10, 2023Updated 3 years ago
- PowerShell based network attached device monitor☆11Sep 3, 2024Updated last year