☆149Jun 9, 2025Updated 10 months ago
Alternatives and similar repositories for Awesome-Active-Directory-PenTest-Tools
Users that are interested in Awesome-Active-Directory-PenTest-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Apr 17, 2025Updated last year
- ☆15Jul 30, 2024Updated last year
- Collection of Notes and CheatSheets used for Red teaming Certs☆498Feb 13, 2023Updated 3 years ago
- Used to get NTLMv2 Hashes from SMB☆24Oct 24, 2024Updated last year
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 11 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- ☆63Mar 15, 2026Updated last month
- ☆696Mar 23, 2026Updated last month
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 5 months ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 10 months ago
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 11 months ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆21Apr 16, 2026Updated last week
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 9 months ago
- Super light, super fast, unlimited search idea☆25Aug 3, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆26Apr 12, 2025Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆25Mar 15, 2026Updated last month
- All about Active Directory pentesting☆171Dec 29, 2020Updated 5 years ago
- ASUS wifi router RCE vulnerability☆19Oct 13, 2025Updated 6 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 10 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆621Updated this week
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆133May 12, 2025Updated 11 months ago
- ☆12Jan 21, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆98May 20, 2025Updated 11 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 10 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- An archive of 0day.today exploits☆356Jul 25, 2025Updated 9 months ago
- ☆44Jul 9, 2024Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆236Apr 18, 2025Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Red Team AI prompts☆49Dec 2, 2025Updated 4 months ago
- ☆28Jan 8, 2025Updated last year
- A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for…☆192Mar 2, 2026Updated last month
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,074Mar 10, 2026Updated last month
- r2inspect is a professional malware analysis framework that automates deep static inspection for PE, ELF, and Mach-O binaries using the r…☆49Mar 23, 2026Updated last month
- Awesome workflow-use conceptual steps & prompts☆24May 19, 2025Updated 11 months ago
- Collection of my Security Blueprints & Guides☆52Oct 2, 2025Updated 6 months ago