Notes and resources for the AD
☆11Aug 2, 2022Updated 3 years ago
Alternatives and similar repositories for active_directory
Users that are interested in active_directory are comparing it to the libraries listed below
Sorting:
- ☆13Jan 19, 2023Updated 3 years ago
- ☆12Updated this week
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- Repo for my scripts that I've made for work done, not all are functional, some are abandoned or WIP.☆10Jan 9, 2026Updated last month
- Notes, Lab Commands and Vulnerability Information for BSCP Exam Prep☆49Jun 7, 2023Updated 2 years ago
- Mac Scripts☆10Jul 16, 2020Updated 5 years ago
- ☆12Mar 31, 2025Updated 11 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Jan 7, 2022Updated 4 years ago
- ☆10Jul 8, 2024Updated last year
- ☆12Apr 6, 2017Updated 8 years ago
- ☆10Feb 20, 2026Updated last week
- ☆14Jul 26, 2025Updated 7 months ago
- ☆17Jan 12, 2026Updated last month
- PowerShell module for collecting and sending Open Telemetry☆10Dec 24, 2024Updated last year
- This repository will contain source codes from the Tradecraft improvement blog series☆14Mar 27, 2025Updated 11 months ago
- ☆12Dec 3, 2022Updated 3 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- ☆11Nov 10, 2020Updated 5 years ago
- Sécurité informatique pratique à travers Python (cours de l'ESGI)☆17Mar 7, 2020Updated 5 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- ☆13Mar 27, 2021Updated 4 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- ☆10Aug 11, 2025Updated 6 months ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- ☆10Feb 2, 2024Updated 2 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Enumerate AWS cloud resources based on provided credential☆51May 11, 2022Updated 3 years ago
- ☆10Aug 14, 2023Updated 2 years ago
- ☆13Mar 23, 2023Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 18, 2020Updated 5 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- Web File Manager☆11Aug 21, 2025Updated 6 months ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- ☆10Nov 17, 2021Updated 4 years ago
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆38Feb 19, 2026Updated last week
- hMailServer Password Decrypter☆12Nov 14, 2016Updated 9 years ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 7 months ago
- Installs arsham/figurine onto a linux system and configures a login hostname welcome message.☆12Nov 6, 2024Updated last year