☆41Jul 1, 2023Updated 2 years ago
Alternatives and similar repositories for attacktive-directory-tools
Users that are interested in attacktive-directory-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Active Directory Wordlists☆111May 28, 2020Updated 5 years ago
- ☆16Jul 1, 2023Updated 2 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆23Jul 26, 2022Updated 3 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- ☆26Jan 27, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A script to automate the creation of a "TOR" router on Debian based systems including Raspberry Pi and install the required tools to do s…☆14Jan 12, 2021Updated 5 years ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- ☆17Nov 27, 2022Updated 3 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆51Sep 25, 2017Updated 8 years ago
- Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.☆13Apr 17, 2018Updated 8 years ago
- Welcome! This is where I'll post updates to projects I'm working on, walkthroughs to capture the flag material and any other areas of res…☆50May 4, 2021Updated 5 years ago
- Reading and resources lists on a variety of technical topics.☆42Oct 29, 2020Updated 5 years ago
- CVE-2022-1040☆18Sep 25, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16May 28, 2022Updated 3 years ago
- Intentionaly very vulnerable API with bonus bad coding practices☆52Nov 15, 2025Updated 5 months ago
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Jul 16, 2024Updated last year
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆65Jan 31, 2020Updated 6 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,312Aug 20, 2024Updated last year
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 6 years ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Apr 30, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- base Bot Queries Discord Made to use API'S CPF, TEL ,CEP, etc...☆11Feb 27, 2023Updated 3 years ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆122Jan 30, 2026Updated 3 months ago
- 「💻」Simple kernel made in 16-bit assembly only☆18Dec 7, 2024Updated last year
- Used to get NTLMv2 Hashes from SMB☆24Oct 24, 2024Updated last year
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆13Aug 4, 2022Updated 3 years ago
- WolvCtf-2023-Challenges-Public☆12Apr 13, 2023Updated 3 years ago
- OSCP Preperation☆14Aug 12, 2021Updated 4 years ago
- PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)☆87Oct 13, 2022Updated 3 years ago
- An Event Tracing for Windows (ETW) EventSource generator built on .Net Core 2.0☆11Dec 8, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Oct 23, 2021Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Apr 19, 2021Updated 5 years ago
- Automate the build of a vulnerable AD environment.☆41Aug 19, 2022Updated 3 years ago
- Subdomains wordlist generted from subdomains of public bug bounty programs☆11Mar 25, 2025Updated last year
- Active Directory Penetration Testing Tool☆29Nov 18, 2021Updated 4 years ago
- ☆11Oct 20, 2022Updated 3 years ago
- only 5 characters to rce☆15Aug 17, 2022Updated 3 years ago