This tool can gather a lot of info without any defender alerts. It is useful for Penetration testers, SOC Analysts, System administrators depends how they use it
☆29Apr 9, 2025Updated 11 months ago
Alternatives and similar repositories for ADInsight
Users that are interested in ADInsight are comparing it to the libraries listed below
Sorting:
- Een leuk framework voor Conditional Access. In mijn Blogs kan je mijn beredenering volgen en een stukje instructie.🥰☆12Nov 14, 2024Updated last year
- Just another repository for malware development☆13May 12, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 4 months ago
- Impacket is a collection of Python classes for working with network protocols.☆13Oct 29, 2022Updated 3 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- AZ-801 Configuring Windows Server Hybrid Advanced Services, 2022☆14Dec 4, 2024Updated last year
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- All the items from my LabTech days☆13Nov 9, 2017Updated 8 years ago
- ☆16Jun 24, 2024Updated last year
- M365PSProfile installs and keeps the PowerShell Modules needed for Microsoft 365 Management up to date. It provides a simple way to add i…☆56Feb 6, 2026Updated last month
- ☆19Sep 17, 2025Updated 6 months ago
- Site to share several small PowerShell scripts built as a set of functions.☆24Jul 25, 2025Updated 7 months ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 3 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆225Mar 13, 2026Updated last week
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated last month
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Apr 30, 2024Updated last year
- ☆21Sep 12, 2025Updated 6 months ago
- Python script for carving Bitlocker VMK keys☆26Feb 4, 2026Updated last month
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆33Jul 5, 2025Updated 8 months ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆41Feb 6, 2026Updated last month
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Scripts and resources used to assist Patch My PC customers with troubleshooting issues in relation to Patch MY PC products☆29Nov 24, 2025Updated 3 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Apr 6, 2025Updated 11 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆61Apr 13, 2025Updated 11 months ago
- CVE-2023-33381: OS command injection on MitraStar GPT-2741GNAC☆13Jun 1, 2023Updated 2 years ago
- Location of some Active Directory lab scripts I have created and find useful☆113Feb 2, 2026Updated last month
- Impacket is a collection of Python classes for working with network protocols.☆20Nov 13, 2025Updated 4 months ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 4 months ago
- A framework for TinTin++ using tmux☆12Jul 10, 2016Updated 9 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago
- An automated NMAP python script☆47Feb 15, 2025Updated last year
- The purpose of this repository is to share KQL queries to help identify security misconfigurations, hunt for specific patterns, or detect…☆80Feb 10, 2026Updated last month
- ☆35Feb 24, 2026Updated 3 weeks ago