ADE: automates Active Directory enumeration for labs (Hack The Box, Hack Smarter, TryHackMe, Proving Grounds) and exam prep (OSCP, CPTS).
☆28Jan 19, 2026Updated last month
Alternatives and similar repositories for ade
Users that are interested in ade are comparing it to the libraries listed below
Sorting:
- Learn MongoDB from absolute basics.☆52Jan 16, 2026Updated last month
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆43Jan 22, 2025Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆33Mar 5, 2025Updated 11 months ago
- ☆60Oct 3, 2025Updated 4 months ago
- Disable Kernel DMA Protection on Windows 11 via pre-boot DMA attack☆41Aug 18, 2025Updated 6 months ago
- ☆10Updated this week
- 🌀 an Interactive Terminal for AI (interminai) - A PTY proxy enabling AI interaction with interactive CLI applications like vim, git reba…☆40Feb 9, 2026Updated 2 weeks ago
- SentinelOne Windows Installation Diagnostic☆11Apr 14, 2025Updated 10 months ago
- Spec files and code to use for AWS CodeCommit, CodeDeploy, and CodePipeline☆10Apr 16, 2021Updated 4 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- My dotfiles.☆11Apr 1, 2023Updated 2 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- Browser extension for launching multi-platform OSINT queries from grouped YAML profiles.☆10Apr 25, 2025Updated 10 months ago
- ☆10May 29, 2023Updated 2 years ago
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆14Jan 4, 2026Updated last month
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆11Mar 25, 2021Updated 4 years ago
- ☆11Nov 29, 2025Updated 2 months ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 11 months ago
- ☆22Feb 8, 2026Updated 2 weeks ago
- OWASP Certified Secure-Software Developer☆21Jan 21, 2026Updated last month
- Spartan is a powerful and versatile network scanning tool designed to help system administrators and security professionals identify vuln…☆17Feb 11, 2025Updated last year
- ☆15Jul 28, 2024Updated last year
- dotfile for all my tools!☆12Feb 14, 2026Updated last week
- 🔵 How I backup, restore and synchronise my shell / system preferences and settings.☆13Feb 12, 2026Updated last week
- Proof of Concept for CVE-2025-24367☆28Dec 8, 2025Updated 2 months ago
- Awesome apps for users switching from the Mac to Linux☆12Apr 23, 2020Updated 5 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Apr 24, 2023Updated 2 years ago
- Gets joke from icanhazdadjoke.com, prints it☆13Jan 5, 2022Updated 4 years ago
- ☆17Jan 9, 2025Updated last year
- ☆50Nov 11, 2025Updated 3 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆55Aug 12, 2025Updated 6 months ago
- Enables an LLM to remotely & securely control a jumphost using synchronous or asynchronous GET requests.☆13Mar 14, 2025Updated 11 months ago
- Lightweight, customizable enumeration script to aid in time-saving when participating in hacking labs or OSCP exam.☆28Feb 18, 2026Updated last week
- ☆19Oct 25, 2024Updated last year
- ☆13Oct 24, 2024Updated last year
- A Better Secrets Scanner built for configurability and speed☆68Updated this week
- Creating them Golden Tickets☆14Aug 16, 2025Updated 6 months ago