Simple python script for AD enumeration
☆31Apr 5, 2021Updated 5 years ago
Alternatives and similar repositories for AutoAD
Users that are interested in AutoAD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 5 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 7 years ago
- ☆27Dec 29, 2021Updated 4 years ago
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- Learning Coccinelle☆11Nov 2, 2017Updated 8 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- Sniffing files generator☆62Feb 24, 2025Updated last year
- ☆25Jul 12, 2023Updated 2 years ago
- Archive of Metasploit Framework v1 (Perl)☆13Sep 29, 2014Updated 11 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Dec 30, 2020Updated 5 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆49May 12, 2021Updated 5 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- POC tool to convert CobaltStrike BOF files to raw shellcode☆223Nov 5, 2021Updated 4 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆72Oct 19, 2017Updated 8 years ago
- Offensive tool to trigger network authentications as SYSTEM☆144Dec 9, 2021Updated 4 years ago
- ☆20Apr 21, 2020Updated 6 years ago
- Evasive Process Hollowing Techniques☆142Aug 16, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆100Sep 30, 2020Updated 5 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Nov 14, 2020Updated 5 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 8 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Feb 13, 2022Updated 4 years ago
- Implant drop-in for EDR testing☆148Nov 15, 2023Updated 2 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously