Active Directory Toolkit
☆20Apr 9, 2019Updated 6 years ago
Alternatives and similar repositories for ADT
Users that are interested in ADT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- Terraform config to spin up a domain controller and some member servers in azure☆33Apr 11, 2022Updated 3 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- Collection of popular DFIR tools in a lightweight and fast docker image☆11Nov 17, 2019Updated 6 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- PowerShell Over WMI☆16Apr 23, 2019Updated 6 years ago
- ☆87Nov 18, 2022Updated 3 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- ☆27May 1, 2023Updated 2 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- ☆41May 16, 2018Updated 7 years ago
- An introduction to Active Directory security☆651Aug 22, 2022Updated 3 years ago
- ☆21Jan 28, 2020Updated 6 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- MSTSC Packet Dump Utility☆30Feb 11, 2022Updated 4 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 11 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- ☆14Jan 18, 2020Updated 6 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- Process Dumper written entirely in VBA.☆25Feb 13, 2021Updated 5 years ago
- A graphical ESE (aka ESENT or JET) database viewer.☆25Oct 26, 2015Updated 10 years ago
- custom bloodhound queries and knowledge base☆12Apr 16, 2024Updated last year
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 3 months ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Go implementation of an Extensible Storage Engine parser☆32Feb 15, 2025Updated last year
- AppContainer tools for launching sandboxed win32 apps, changing ACL permissions and learning from ETW traces.☆32May 4, 2025Updated 10 months ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- ☆29Jan 28, 2026Updated last month
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆36Feb 13, 2024Updated 2 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆192Jul 7, 2021Updated 4 years ago