cfalta / adsecLinks
An introduction to Active Directory security
☆650Updated 2 years ago
Alternatives and similar repositories for adsec
Users that are interested in adsec are comparing it to the libraries listed below
Sorting:
- Adversary Tactics - PowerShell Training☆1,551Updated 5 years ago
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆633Updated 3 years ago
- Collection of PowerShell functions a Red Teamer may use in an engagement☆536Updated last year
- A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. T…☆955Updated 3 years ago
- Deploy customizable Active Directory labs in Azure - automatically.☆425Updated 8 months ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,596Updated 3 years ago
- A toolkit to attack Office365☆1,091Updated 4 years ago
- PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.☆868Updated last year
- An Office365 User Attack Tool☆638Updated last year
- Azure Security Resources and Notes☆1,588Updated last month
- Microsoft signed ActiveDirectory PowerShell module☆932Updated 5 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,005Updated last year
- Exploit allowing you to read registry hives as non-admin on Windows 10 and 11☆770Updated 4 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆800Updated 2 years ago
- gather gather gather☆582Updated 4 months ago
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆711Updated this week
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆853Updated 9 months ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping …☆990Updated 2 months ago
- Some notes and examples for cobalt strike's functionality☆1,100Updated 3 years ago
- Defences against Cobalt Strike☆1,286Updated 3 years ago
- Bloodhound Reporting for Blue and Purple Teams☆1,220Updated 5 months ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Updated 2 years ago
- Overlord - Red Teaming Infrastructure Automation☆626Updated last year
- SMBeagle - Fileshare auditing tool.☆721Updated 6 months ago
- Course repository for PowerShell for Pentesters Course☆432Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,403Updated 2 years ago
- A PowerShell armoury for security guys and girls☆473Updated last year
- Get file less command execution for lateral movement.☆626Updated 3 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆801Updated last year
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆852Updated 3 years ago