This tool can gather a lot of info without any defender alerts. It is useful for Penetration testers, SOC Analysts, System administrators depends how they use it
☆29Apr 9, 2025Updated last year
Alternatives and similar repositories for ADInsight
Users that are interested in ADInsight are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Een leuk framework voor Conditional Access. In mijn Blogs kan je mijn beredenering volgen en een stukje instructie.🥰☆12Nov 14, 2024Updated last year
- Just another repository for malware development☆14May 12, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆35Nov 13, 2025Updated 4 months ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- AZ-801 Configuring Windows Server Hybrid Advanced Services, 2022☆14Dec 4, 2024Updated last year
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- All the items from my LabTech days☆13Nov 9, 2017Updated 8 years ago
- M365PSProfile installs and keeps the PowerShell Modules needed for Microsoft 365 Management up to date. It provides a simple way to add i…☆58Mar 28, 2026Updated last week
- About PowerShell is educational series of videos that teach you about various aspects of PowerShell language.☆23Jan 11, 2025Updated last year
- ☆19Sep 17, 2025Updated 6 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆16Jun 24, 2024Updated last year
- Site to share several small PowerShell scripts built as a set of functions.☆24Jul 25, 2025Updated 8 months ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 3 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 2 months ago
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆254Mar 26, 2026Updated 2 weeks ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 4 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆68Apr 30, 2024Updated last year
- ☆21Sep 12, 2025Updated 6 months ago
- Python script for carving Bitlocker VMK keys☆26Feb 4, 2026Updated 2 months ago
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆34Jul 5, 2025Updated 9 months ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated 2 months ago
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Havoc C2 BOF port of the KslD.sys BYOVD technique. Credential extraction from lsass via physical memory — no OpenProcess, no auditable AP…☆62Apr 1, 2026Updated last week
- Scripts and resources used to assist Patch My PC customers with troubleshooting issues in relation to Patch MY PC products☆29Apr 2, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Apr 6, 2025Updated last year
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆61Apr 13, 2025Updated 11 months ago
- Location of some Active Directory lab scripts I have created and find useful☆114Feb 2, 2026Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.☆20Nov 13, 2025Updated 4 months ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 5 months ago
- A framework for TinTin++ using tmux☆12Jul 10, 2016Updated 9 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago