LDAP Enumeration Tool for Pentesters
☆48Apr 22, 2025Updated 11 months ago
Alternatives and similar repositories for LDAPHunter
Users that are interested in LDAPHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆26Updated this week
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆49Feb 27, 2026Updated last month
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- PowerShell & Python tools developed for CTFs and certification exams☆70Aug 10, 2025Updated 7 months ago
- This cheatsheet maps common impacket workflows to their modern alternatives☆84Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 9 months ago
- ☆20Sep 6, 2025Updated 6 months ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Updated this week
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 8 months ago
- This repository serves as a curated resource for OffSec's OSEP (PEN-300) certification preparation, containing useful links, materials, a…☆69Nov 11, 2024Updated last year
- ☆17Oct 21, 2023Updated 2 years ago
- ☆24Apr 28, 2024Updated last year
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Jun 10, 2025Updated 9 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Ludus range for the Constructing Defense Lab☆113Feb 23, 2026Updated last month
- ☆12Aug 16, 2024Updated last year
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆110Aug 21, 2025Updated 7 months ago
- ☆35Jul 31, 2024Updated last year
- Self-mutating macOS implant☆126Mar 16, 2026Updated last week
- ☆11Jun 5, 2022Updated 3 years ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆215Jan 12, 2026Updated 2 months ago
- CVE-2022-21587 POC☆15Feb 17, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- CVE-2024-53691☆13Jan 13, 2025Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Dec 7, 2024Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆324May 17, 2024Updated last year
- Easy recon tool for OSCP and HTB☆10Aug 8, 2024Updated last year
- DeepSeek Pentest AI - Burp Suite extension☆58Sep 14, 2025Updated 6 months ago
- Lists various tools used in hardware hacking.☆33Jan 25, 2026Updated 2 months ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Spring-Kafka-Deserialization-Remote-Code-Execution☆32Oct 8, 2023Updated 2 years ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated last month
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Library of BOFs to interact with SQL servers☆229Dec 3, 2025Updated 3 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Jul 7, 2025Updated 8 months ago