This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.
☆32Jun 26, 2024Updated last year
Alternatives and similar repositories for AttackingAD
Users that are interested in AttackingAD are comparing it to the libraries listed below
Sorting:
- Collection of cyphers for bloodhound☆155Jun 26, 2024Updated last year
- Quickly identify the ownership of hosts to identify scope during penetration tests☆13Jul 19, 2024Updated last year
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- For all your network pentesting needs☆154Jun 26, 2024Updated last year
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- A Platform for Testing Secure Coding/Config☆19Nov 13, 2018Updated 7 years ago
- KeepNote For OSCP Course☆24Apr 15, 2020Updated 5 years ago
- Tool that automates Active Directory enumeration☆88Apr 24, 2021Updated 4 years ago
- ☆19Nov 18, 2020Updated 5 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Oct 28, 2019Updated 6 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Dec 8, 2024Updated last year
- A curated list of awesome BloodhoundAD resources☆237Oct 13, 2022Updated 3 years ago
- ☆299Nov 9, 2020Updated 5 years ago
- A PowerShell script for performing a build review of a Windows host☆23Mar 11, 2019Updated 6 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆31Feb 10, 2025Updated last year
- Python script to check HTTP security headers☆68Nov 16, 2025Updated 3 months ago
- Some useful scripts I have written or collected☆82Jul 24, 2023Updated 2 years ago
- A Report Generation Tool for Security Assessment☆65Dec 31, 2018Updated 7 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- A simple SOCKS5 server written in Go☆31Nov 7, 2016Updated 9 years ago
- ☆310Dec 17, 2018Updated 7 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Resources for our Active Directory security workshops☆141Sep 9, 2021Updated 4 years ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,146Nov 19, 2024Updated last year
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆43Oct 21, 2018Updated 7 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆331Oct 20, 2019Updated 6 years ago
- Retrieve AD accounts description and search for password in it☆82Jul 21, 2022Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- ☆11Oct 17, 2024Updated last year
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Python script to send SMS using Huawei new[er] USB dongles via the HTTP interface☆11Jul 10, 2017Updated 8 years ago