balaasif6789 / AD-Pentesting
☆104Updated 5 years ago
Alternatives and similar repositories for AD-Pentesting:
Users that are interested in AD-Pentesting are comparing it to the libraries listed below
- Windows Kernel Exploits☆66Updated 7 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆142Updated last year
- Windows for Red Teamers☆126Updated 3 years ago
- Active Directory Labs/exams Review☆251Updated 4 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆96Updated 3 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- Powershell crazy and sometimes diabolic scripts☆155Updated 4 years ago
- Preparation for OSWE☆42Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated last year
- ☆80Updated 5 years ago
- Notes for CRTP☆40Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆61Updated 5 years ago
- This repo will contain some basic pentest/RT commands.☆37Updated 2 years ago
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆213Updated 4 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆143Updated this week
- List of red team resources☆91Updated 7 years ago
- OSWE Preparation☆37Updated 5 years ago
- Changes for Visual Studio 2013☆117Updated 9 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated 10 months ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- ☆165Updated 4 years ago
- OSCP Cheatsheets☆96Updated 5 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆101Updated last year
- scan for NTLM directories☆359Updated 9 months ago
- Active Directory Cheat Sheet☆140Updated 3 years ago
- Collection of username lists for enumerating kerberos domain users☆91Updated 7 years ago
- Vulnerable SAML infrastructure training applicaiton☆51Updated 2 years ago