Various AD tools needed for penetration testing in one place.
☆24Jul 13, 2023Updated 2 years ago
Alternatives and similar repositories for AD_Pentest_Bundle
Users that are interested in AD_Pentest_Bundle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C2 Infrastructure Automation☆119Jun 21, 2025Updated 10 months ago
- UAC Bypass using CMSTP in Rust☆36Dec 6, 2024Updated last year
- ☆51Feb 8, 2024Updated 2 years ago
- Harness the Power of AI for all your reporting needs.☆28Apr 17, 2023Updated 3 years ago
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆79Dec 2, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Automation scripts in preparation for PWK/OSCP labs☆17Sep 20, 2021Updated 4 years ago
- ☆16May 30, 2025Updated 10 months ago
- ☆11Oct 7, 2022Updated 3 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- A Terraform framework for deploying to Oracle Cloud Infrastructure. This is the landing zone (starting point) for the framework.☆13Jan 21, 2025Updated last year
- ☆20Apr 10, 2025Updated last year
- Powershell modules and commands that come in handy for pentests and red team assessments.☆22Oct 31, 2018Updated 7 years ago
- ☆29Oct 1, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- World CIDR IP lists☆10Jan 28, 2026Updated 3 months ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 3 years ago
- A compendium of threat modeling and security testing resources for LLMs and GenAI agents☆19Oct 16, 2024Updated last year
- OSCP preparation☆12Sep 18, 2025Updated 7 months ago
- ☆36Nov 26, 2024Updated last year
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆20Apr 17, 2026Updated last week
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- ☆12Feb 20, 2025Updated last year
- Powershell tools used for Red Team / Pentesting.☆83Jan 8, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- ☆12Oct 10, 2024Updated last year
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- Knowledge Management for Offensive Security Professionals Official Repository☆153Feb 25, 2025Updated last year
- ☆11Dec 17, 2023Updated 2 years ago
- A plugin to get our hackerone reports data into obsidian☆12Jan 28, 2026Updated 3 months ago
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Sep 24, 2024Updated last year
- ☆11Mar 19, 2026Updated last month
- An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.🍻☆13Mar 5, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago
- Evasive shellcode loader☆401Oct 17, 2024Updated last year
- ☆12Apr 5, 2025Updated last year
- Tool to hack Graphql☆15Oct 17, 2023Updated 2 years ago
- Private Nuclei Templates☆99Feb 24, 2025Updated last year
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆38Jun 12, 2024Updated last year