Resources for AD penetration testing and security
☆33Feb 21, 2022Updated 4 years ago
Alternatives and similar repositories for Active-Directory-Penetration-Testing-and-Security
Users that are interested in Active-Directory-Penetration-Testing-and-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆104Nov 3, 2019Updated 6 years ago
- ☆244Aug 31, 2021Updated 4 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Sep 1, 2019Updated 6 years ago
- Research framework for reverse engineering and cheat prototyping in Counter-Strike 2. Developed as part of a Master’s Thesis at UC3M.☆62Apr 6, 2026Updated last month
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Repository for AsBuiltReport Microsoft DHCP module☆15Jan 31, 2026Updated 3 months ago
- An active directory laboratory for penetration testing.☆151Dec 11, 2020Updated 5 years ago
- Scripts and piece of codes used for Active Directory configuration☆83Feb 14, 2023Updated 3 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆218Dec 28, 2022Updated 3 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 4 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated last year
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- vuln-netframework is a .net-framework 4.7 project that include worst coding practices about common vulnerabilities like Insecure Deserial…☆10Nov 9, 2025Updated 6 months ago
- A BOF for lazy people☆24Apr 4, 2024Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆23May 8, 2022Updated 4 years ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆24Jun 18, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- Microsoft Cloud App Security labs☆14Dec 17, 2018Updated 7 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆28Nov 11, 2020Updated 5 years ago
- Juniper Firewalls CVE-2023-36845 - RCE☆55Dec 29, 2023Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Mar 29, 2016Updated 10 years ago
- Zipper, a CobaltStrike file and folder compression utility.☆223Jan 18, 2020Updated 6 years ago
- bash script for automating subdomain enumeration process either passive or active☆30Feb 24, 2026Updated 2 months ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- ☆89Jan 2, 2024Updated 2 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- EP4: Build an Azure Lab with Terraform☆15Apr 25, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- All about Active Directory pentesting☆171Dec 29, 2020Updated 5 years ago
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆20Jun 1, 2024Updated last year
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆45Oct 26, 2025Updated 6 months ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆18Feb 17, 2015Updated 11 years ago
- ☆20Apr 5, 2026Updated last month
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- ssb=simple subdomain bruteforcer☆20Mar 10, 2023Updated 3 years ago