chryzsh / DarthSidiousView external linksLinks
Building an Active Directory domain and hacking it
☆664Dec 23, 2019Updated 6 years ago
Alternatives and similar repositories for DarthSidious
Users that are interested in DarthSidious are comparing it to the libraries listed below
Sorting:
- Active Directory Assessment and Privilege Escalation Script☆1,130Dec 7, 2022Updated 3 years ago
- A curated list of awesome BloodhoundAD resources☆238Oct 13, 2022Updated 3 years ago
- ☆526Sep 15, 2022Updated 3 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆492Feb 16, 2019Updated 6 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,792Jul 29, 2025Updated 6 months ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,547Aug 2, 2019Updated 6 years ago
- Red Team Tool Kit☆1,133Dec 8, 2022Updated 3 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆811Aug 28, 2022Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆757Nov 18, 2021Updated 4 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,318Dec 6, 2023Updated 2 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,128Feb 10, 2021Updated 5 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Exchange privilege escalations to Active Directory☆803Apr 23, 2023Updated 2 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆1,859Aug 12, 2021Updated 4 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,823Mar 17, 2021Updated 4 years ago
- PSAmsi is a tool for auditing and defeating AMSI signatures.☆398Apr 22, 2018Updated 7 years ago
- Run PowerShell command without invoking powershell.exe☆1,530Mar 23, 2023Updated 2 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,143Nov 19, 2024Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,440Oct 1, 2025Updated 4 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,612Dec 10, 2018Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆401May 20, 2020Updated 5 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,639Aug 28, 2025Updated 5 months ago
- List of Awesome Windows Security Resources☆311Feb 17, 2023Updated 2 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- Payload Generation Framework☆1,956Aug 21, 2024Updated last year
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,621Jan 23, 2024Updated 2 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,657Nov 28, 2020Updated 5 years ago
- ☆230May 10, 2018Updated 7 years ago
- Windows Event Log Killer☆1,810Sep 21, 2023Updated 2 years ago
- Cheat sheets for various projects.☆1,085Oct 16, 2017Updated 8 years ago
- A curated list of awesome Security Hardening techniques for Windows.☆1,790Jan 7, 2020Updated 6 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Mar 27, 2022Updated 3 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,302Aug 19, 2019Updated 6 years ago
- The goal of this repository is to document the most common techniques to bypass AppLocker.☆2,043Sep 11, 2023Updated 2 years ago
- A tool to elevate privilege with Windows Tokens☆1,055Oct 6, 2023Updated 2 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆325Apr 26, 2020Updated 5 years ago