This is a cheatsheet of commands and processes to compromise an Active Directory environment. Everything documented in this repository is based on my own experience with the CRTA exam, and the context and circumstances may vary. For educational purposes only.
☆27May 18, 2025Updated 10 months ago
Alternatives and similar repositories for CRTA-CheatSheet
Users that are interested in CRTA-CheatSheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- These are my customization scripts written in ansible for every time I have to perform a Kali clean install.☆27Apr 26, 2025Updated 11 months ago
- ☆15Jan 4, 2021Updated 5 years ago
- Red Team tools containerized☆76Mar 25, 2026Updated 2 weeks ago
- wpDiscuz 7.0.4 Remote Code Execution☆18Jun 15, 2021Updated 4 years ago
- Write-ups of Try Hack me challenge machines☆10Mar 29, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- DoomScope framework - Automated Web Security/Recon Scanner☆87Dec 22, 2025Updated 3 months ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- Fork repository for CryptoCat's "Binary Exploitation 101 Course" AKA "Practical Buffer Overflow Exploitation"☆23Dec 9, 2022Updated 3 years ago
- HHousen's writeups to various HackTheBox machines and challenges from https://hackthebox.com.☆21Mar 3, 2023Updated 3 years ago
- 免杀木马样本☆106Oct 11, 2025Updated 5 months ago
- C library for quantum-resistant cryptographic algorithms.☆12Jun 21, 2018Updated 7 years ago
- A compilation of resources for studying for the eCPPTv2☆18Sep 28, 2022Updated 3 years ago
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 3 months ago
- Writeups for Hack The Box machines/challenges☆26Nov 4, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆38Feb 2, 2026Updated 2 months ago
- Windows Privilege Escalation☆18Jun 11, 2022Updated 3 years ago
- 🍣🐈😺NigiriPad is a nigiri sushi and cat inspired macropad (essentially a mini-keyboard) that can be used with macro shortcuts. NigiriPa…☆16May 30, 2025Updated 10 months ago
- A very simple & fast WebTTL based on ESP8266 Wifi Module, coding by Arduino☆10Apr 22, 2022Updated 3 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- genAI agent providing security context, tooling for performing security analysis on CVE, components and more☆22Updated this week
- ESP32 Marauder Portable IDE creation script☆10Oct 10, 2022Updated 3 years ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 7 months ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆24Dec 28, 2025Updated 3 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated 2 months ago
- Repository of useful bookmarklets☆11Apr 9, 2025Updated last year
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆164Feb 2, 2026Updated 2 months ago
- Chrome Extensions Dataset☆10Updated this week
- TrueMedia.org web application for querying multiple deepfake detection models and analyzing results☆22Jan 24, 2025Updated last year
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆48Mar 5, 2026Updated last month
- RoadMap For PenTesting☆18Nov 19, 2021Updated 4 years ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆44Aug 2, 2025Updated 8 months ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆39Oct 17, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The source code for the EFI hack that allowed Windows XP to run on an Intel Mac pre-bootcamp.☆16May 14, 2011Updated 14 years ago
- Using ArduinoBLE to control Lovense devices.☆16Jan 23, 2022Updated 4 years ago
- this is a tool to detect the Web service is ok or not☆24Oct 14, 2020Updated 5 years ago
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- Enumerate active EDR's on the system☆151Sep 23, 2025Updated 6 months ago
- A thin OS for application goodness☆27Aug 4, 2014Updated 11 years ago
- A repository to help share financial-variables that people and tools care about☆16Nov 18, 2025Updated 4 months ago