Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010
☆128Jul 16, 2022Updated 3 years ago
Alternatives and similar repositories for active_directory
Users that are interested in active_directory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows File Integrity -- an archive of information on installed Windows binaries.☆34Aug 26, 2022Updated 3 years ago
- Codebase to generate an msdt-follina payload☆1,634Jun 8, 2022Updated 3 years ago
- ☆22Dec 24, 2021Updated 4 years ago
- Tryhackme rooms & tools☆63May 22, 2020Updated 5 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Remote Thread Detection with a Kernel Driver☆35Jan 14, 2025Updated last year
- A stream implementation for Python that provides transparent base64 encoding and decoding of an underlying stream.☆17Feb 17, 2023Updated 3 years ago
- CTFs as you need them☆30May 3, 2023Updated 3 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,282Apr 12, 2024Updated 2 years ago
- Notes compiled for the OSCP exam.☆168Feb 16, 2022Updated 4 years ago
- A place to store my various pentesting related code thats too small/niche to justify its own repository, and a simple website with notes …☆40Updated this week
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆46Sep 25, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Volumetric Development☆11Mar 19, 2024Updated 2 years ago
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆199Aug 9, 2022Updated 3 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆255Aug 31, 2022Updated 3 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- All around cracking wordlist.☆31Oct 25, 2023Updated 2 years ago
- This Python script can enumerate all URLs present in robots.txt files, and test whether they can be accessed or not.☆47Feb 11, 2025Updated last year
- Internal Network Penetration Test Playbook☆20Jul 13, 2021Updated 4 years ago
- ☆16Apr 12, 2018Updated 8 years ago
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆12Jan 9, 2026Updated 3 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆14Aug 21, 2022Updated 3 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Feb 19, 2020Updated 6 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 7 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 3 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Installs ADDS and configures a vulnerable domain via a powershell script☆15Jul 13, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A tiny tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆27May 28, 2025Updated 11 months ago
- Recursively calculates the hash of all files in a given path and checks them against the Virustotal threat database☆14Jun 30, 2023Updated 2 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- blog☆24Mar 9, 2026Updated last month
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- ☆11Mar 7, 2021Updated 5 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆30Dec 7, 2025Updated 4 months ago