☆147Jun 9, 2025Updated 9 months ago
Alternatives and similar repositories for Awesome-Active-Directory-PenTest-Tools
Users that are interested in Awesome-Active-Directory-PenTest-Tools are comparing it to the libraries listed below
Sorting:
- ☆15Apr 17, 2025Updated 11 months ago
- ☆16Jul 30, 2024Updated last year
- Collection of Notes and CheatSheets used for Red teaming Certs☆496Feb 13, 2023Updated 3 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆33Jul 31, 2025Updated 7 months ago
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 10 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- ☆61Jun 28, 2025Updated 8 months ago
- ☆687Feb 28, 2026Updated 2 weeks ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 4 months ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 9 months ago
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 9 months ago
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 4 months ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 8 months ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- Super light, super fast, unlimited search idea☆25Aug 3, 2025Updated 7 months ago
- ☆23Apr 12, 2025Updated 11 months ago
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆24Updated this week
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 9 months ago
- All about Active Directory pentesting☆168Dec 29, 2020Updated 5 years ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆606Updated this week
- ASUS wifi router RCE vulnerability☆19Oct 13, 2025Updated 5 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆132May 12, 2025Updated 10 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 9 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆94May 20, 2025Updated 9 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- An archive of 0day.today exploits☆347Jul 25, 2025Updated 7 months ago
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆232Apr 18, 2025Updated 11 months ago
- Red Team AI prompts☆49Dec 2, 2025Updated 3 months ago
- ☆28Jan 8, 2025Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,060Mar 10, 2026Updated last week
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆49Feb 28, 2026Updated 2 weeks ago
- Awesome workflow-use conceptual steps & prompts☆23May 19, 2025Updated 9 months ago
- Collection of my Security Blueprints & Guides☆52Oct 2, 2025Updated 5 months ago
- An AI-powered assistant for hackers and security professionals built for Caido☆31Jan 24, 2026Updated last month
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago