This repository contains scripts about ACL abuse and any other active directory attacking methods.
☆36Aug 20, 2023Updated 2 years ago
Alternatives and similar repositories for AD-attacks-automation-scripts
Users that are interested in AD-attacks-automation-scripts are comparing it to the libraries listed below
Sorting:
- ☆62Dec 13, 2025Updated 2 months ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆70Feb 3, 2024Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆21Jul 16, 2025Updated 7 months ago
- ☆64Mar 14, 2024Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Aug 19, 2024Updated last year
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year
- Checker de Spotify en la terminal [TERMUX]☆20Feb 26, 2023Updated 3 years ago
- ☆35Dec 21, 2023Updated 2 years ago
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 4 months ago
- Reverse engineering the TI AM3358 boot ROM☆60Aug 25, 2024Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Mar 26, 2022Updated 3 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- A fast subdomain takeover tool☆85Nov 10, 2023Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- This is an AD pentest tools collection☆59Jul 6, 2024Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Aug 22, 2024Updated last year
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Feb 5, 2024Updated 2 years ago
- ☆107Feb 12, 2025Updated last year
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆219Sep 4, 2025Updated 5 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ☆44Jul 9, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- Protection against HTML smuggling attacks.☆101Jul 10, 2025Updated 7 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Dec 22, 2023Updated 2 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year