This is a cheatsheet of commands and processes to compromise an Active Directory environment. Everything documented in this repository is based on my own experience with the CRTA exam, and the context and circumstances may vary. For educational purposes only.
☆25May 18, 2025Updated 10 months ago
Alternatives and similar repositories for CRTA-CheatSheet
Users that are interested in CRTA-CheatSheet are comparing it to the libraries listed below
Sorting:
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆69Mar 8, 2026Updated last week
- Red Team tools containerized☆76Dec 6, 2025Updated 3 months ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- CEH Practical Preparation☆12Oct 2, 2022Updated 3 years ago
- purplestorm writeup collection☆29Mar 12, 2026Updated last week
- HHousen's writeups to various HackTheBox machines and challenges from https://hackthebox.com.☆21Mar 3, 2023Updated 3 years ago
- C library for quantum-resistant cryptographic algorithms.☆12Jun 21, 2018Updated 7 years ago
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 3 months ago
- Writeups for Hack The Box machines/challenges☆25Nov 4, 2021Updated 4 years ago
- Windows Privilege Escalation☆18Jun 11, 2022Updated 3 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- 🍣🐈😺NigiriPad is a nigiri sushi and cat inspired macropad (essentially a mini-keyboard) that can be used with macro shortcuts. NigiriPa…☆16May 30, 2025Updated 9 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆81Sep 11, 2025Updated 6 months ago
- Este repositorio está diseñado para la preparación de la certificación eJPTv2 (eLearnSecurity Junior Penetration Tester v2). Incluye recu…☆38Oct 25, 2024Updated last year
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 7 months ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆24Dec 28, 2025Updated 2 months ago
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆162Feb 2, 2026Updated last month
- Microsoft Azure Security Engineer Associate (AZ-500) Study Notes☆27Jun 13, 2023Updated 2 years ago
- TrueMedia.org web application for querying multiple deepfake detection models and analyzing results☆22Jan 24, 2025Updated last year
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆39Oct 17, 2024Updated last year
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆37Aug 2, 2025Updated 7 months ago
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- Practice material for my subscribers.☆24Oct 19, 2024Updated last year
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- A prompt-based pipeline for finding, validating, and proving vulnerabilities using LLM sub-agents.☆45Feb 22, 2026Updated 3 weeks ago
- this is a tool to detect the Web service is ok or not☆23Oct 14, 2020Updated 5 years ago
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- Tailscale Domain Management Gateway: allow Tailscale nodes to retrieve public (Let's Encrypt) TLS certificates for custom domains.☆40Feb 11, 2026Updated last month
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 2 months ago
- A powerful OSINT (Open-Source Intelligence) tool for searching usernames across 50+ social media platforms, with AI-powered analysis and …☆20Sep 7, 2025Updated 6 months ago
- Store 4TB in 5GB: S3-compatible storage with 99.9% compression for versioned files☆33Feb 7, 2026Updated last month
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆158Jan 3, 2026Updated 2 months ago
- Burp Suite extension to detect Web Cache Deception vulnerabilities, now compatible with the Community Edition. Automates advanced cache …☆18Nov 18, 2025Updated 4 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 4 months ago
- 为初学者开发的爆破靶场。☆29Nov 28, 2025Updated 3 months ago
- Toolbox for modifying/updating/backing up Nissan LEAF Head Unit☆27Nov 30, 2025Updated 3 months ago
- Osint-kit is a curated collection of tools for OSINT investigations, from auditing and screen recording to aggregation. Build your ultima…☆160Dec 11, 2025Updated 3 months ago