Active Directory Toolkit
☆20Apr 9, 2019Updated 7 years ago
Alternatives and similar repositories for ADT
Users that are interested in ADT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Terraform config to spin up a domain controller and some member servers in azure☆33Apr 11, 2022Updated 4 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 6 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 5 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PowerShell Over WMI☆16Apr 23, 2019Updated 7 years ago
- A PowerShell armoury for security guys and girls☆469Jan 23, 2024Updated 2 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- ☆27May 1, 2023Updated 3 years ago
- ☆41May 16, 2018Updated 8 years ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆34Sep 17, 2025Updated 8 months ago
- ☆21Jan 28, 2020Updated 6 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- Automation Engine using the Covenant API and lua scripting☆24Dec 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 7 years ago
- MSTSC Packet Dump Utility☆30Feb 11, 2022Updated 4 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 11 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- Microsoft Active Directory (AD) Awesome List☆27Feb 27, 2025Updated last year
- ☆14Jan 18, 2020Updated 6 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 5 years ago
- Process Dumper written entirely in VBA.☆25Feb 13, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PowerShell module for ctypes/PInvoke calls☆30Jun 12, 2025Updated 11 months ago
- A graphical ESE (aka ESENT or JET) database viewer.☆25Oct 26, 2015Updated 10 years ago
- custom bloodhound queries and knowledge base☆12Apr 16, 2024Updated 2 years ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 5 months ago
- Go implementation of an Extensible Storage Engine parser☆32Mar 21, 2026Updated 2 months ago
- AppContainer tools for launching sandboxed win32 apps, changing ACL permissions and learning from ETW traces.☆34May 4, 2025Updated last year
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆29May 7, 2026Updated 2 weeks ago
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆36Feb 13, 2024Updated 2 years ago
- Scans npmjs.org for npm packages that can be taken over☆19Jun 6, 2022Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆194Jul 7, 2021Updated 4 years ago
- Script to identify new host using the subjectAltName (Subject Alternate Name) extension of a x509 HTTP TLS certificate.☆12Dec 25, 2020Updated 5 years ago