Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010
☆128Jul 16, 2022Updated 3 years ago
Alternatives and similar repositories for active_directory
Users that are interested in active_directory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows File Integrity -- an archive of information on installed Windows binaries.☆34Aug 26, 2022Updated 3 years ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆150Jul 21, 2022Updated 3 years ago
- A script to download all the challenges and files from a CTFd instance☆26Oct 27, 2024Updated last year
- Crappy Golang code to list local listening ports and their associated processes.☆34Apr 22, 2023Updated 2 years ago
- A stream implementation for Python that provides transparent base64 encoding and decoding of an underlying stream.☆17Feb 17, 2023Updated 3 years ago
- Bash implementation of CVE-2021-4034☆15Jan 26, 2022Updated 4 years ago
- Crappy Python code to render a QR code as "plaintext" with Unicode☆40Apr 20, 2024Updated last year
- CTFs as you need them☆30May 3, 2023Updated 2 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,264Apr 12, 2024Updated last year
- This repository houses some of the small scripts I had used to quickly document throughout my OSCP course. This was referenced on YouTube…☆182Oct 7, 2019Updated 6 years ago
- A Python API for Hack the Box platform interaction☆64Nov 27, 2020Updated 5 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- Developing an open source Windows EDR written in C & C++ & C#☆28Updated this week
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆256Aug 31, 2022Updated 3 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- slides for talk given during uscg 2023 combine☆38Sep 6, 2023Updated 2 years ago
- 🐞 A simple Windows x86 debugging framework written in C++20 that supports software breakpoints and hardware breakpoints. It can be used …☆13Mar 30, 2025Updated 11 months ago
- This Python script can enumerate all URLs present in robots.txt files, and test whether they can be accessed or not.☆47Feb 11, 2025Updated last year
- Internal Network Penetration Test Playbook☆20Jul 13, 2021Updated 4 years ago
- ☆16Apr 12, 2018Updated 7 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆57Feb 9, 2024Updated 2 years ago
- Remote Thread Detection with a Kernel Driver☆34Jan 14, 2025Updated last year
- ☆14Aug 21, 2022Updated 3 years ago
- ☆18Jan 24, 2017Updated 9 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Feb 19, 2020Updated 6 years ago
- This is a clone of the of Introduction To Linux repo that I developed for the class I taught at the US Coast Guard Academy.☆65Aug 26, 2018Updated 7 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆187Mar 1, 2023Updated 3 years ago
- A tiny tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆27May 28, 2025Updated 9 months ago
- ☆18Feb 8, 2021Updated 5 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago