alperenugurlu / AD_Enumeration_HuntLinks
☆92Updated 2 years ago
Alternatives and similar repositories for AD_Enumeration_Hunt
Users that are interested in AD_Enumeration_Hunt are comparing it to the libraries listed below
Sorting:
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Azure Service Subdomain Enumeration☆66Updated last year
- Web Hacking and Red Teaming MindMap☆77Updated last month
- Automate Scoping, OSINT and Recon assessments.☆96Updated 7 months ago
- ☆90Updated 7 months ago
- ☆25Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated last month
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- This is an AD pentest tools collection☆58Updated last year
- ☆22Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- a map for the azure oriented pentests☆66Updated 2 years ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆36Updated 5 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆142Updated last year
- ☆65Updated 2 years ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆41Updated last year
- A collection of red blue team staff☆46Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆111Updated last month
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆22Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- LDAP Enumeration Tool for Pentesters☆48Updated 4 months ago
- Everything and anything related to password spraying☆145Updated last year
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- ☆55Updated last year