ErdemOzgen / ActiveDirectoryAttacksLinks
☆10Updated 4 years ago
Alternatives and similar repositories for ActiveDirectoryAttacks
Users that are interested in ActiveDirectoryAttacks are comparing it to the libraries listed below
Sorting:
- A tiny tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆27Updated 6 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆115Updated last year
- ☆182Updated last year
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆16Updated 2 years ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆153Updated 2 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆127Updated 3 months ago
- Enumeration from a non-domain joined Windows computer☆32Updated last year
- Get insights into the actual strength and quality of passwords in Active Directory.☆156Updated last year
- Identify the attack paths in BloodHound breaking your AD tiering☆322Updated 3 years ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆177Updated 5 months ago
- ☆53Updated last month
- Automatically run and populate a new instance of BH CE☆110Updated last month
- Azure AiTM Function PoC to phish Entra ID Credentials☆25Updated 2 weeks ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 11 months ago
- ☆110Updated 2 years ago
- An Ansible collection that installs an SCCM deployment with optional configurations.☆95Updated 5 months ago
- ☆20Updated 3 weeks ago
- Location of some Active Directory lab scripts I have created and find useful☆83Updated last week
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆61Updated 10 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆97Updated last month
- PowerShell tool to triage systems☆12Updated 2 years ago
- ☆122Updated last year
- A tiny tool built to help AD Admins tame the Protected Users group.☆133Updated 3 months ago
- ☆13Updated 2 years ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆163Updated 3 weeks ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆248Updated this week
- Azure AD cheatsheet for the CARTP course☆138Updated 3 years ago
- A comprehensive list of usable Entra ID first-party clients with pre-consented Microsoft Graph scopes, in a simple YAML-file explorable w…☆144Updated 3 weeks ago
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆22Updated 2 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆180Updated 7 months ago