List of Awesome Windows Security Resources
☆316Feb 17, 2023Updated 3 years ago
Alternatives and similar repositories for awesome-windows-security
Users that are interested in awesome-windows-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Building an Active Directory domain and hacking it☆667Dec 23, 2019Updated 6 years ago
- A curated list of awesome BloodhoundAD resources☆237Oct 13, 2022Updated 3 years ago
- A tool to password spray Jenkins instances☆60May 28, 2019Updated 6 years ago
- A curated list of awesome Security Hardening techniques for Windows.☆1,795Jan 7, 2020Updated 6 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Jul 29, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Helper script for mangling CS payloads☆51May 5, 2019Updated 7 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- C# Script used for Red Team☆722Nov 16, 2021Updated 4 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆55Jan 24, 2020Updated 6 years ago
- A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams☆601Feb 20, 2020Updated 6 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 7 years ago
- Issues to consider when planning a red team exercise.☆612Aug 23, 2017Updated 8 years ago
- Aggressor scripts for Cobalt Strike☆62Dec 9, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆17Jul 26, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,824Jul 29, 2025Updated 9 months ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆493Feb 16, 2019Updated 7 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,117Apr 26, 2020Updated 6 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 7 years ago
- List of Awesome Advanced Windows Exploitation References☆1,562Jan 13, 2022Updated 4 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automation for internal Windows Penetrationtest / AD-Security☆3,663Aug 28, 2025Updated 8 months ago
- ☆183Dec 18, 2018Updated 7 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆319Mar 31, 2021Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆79Jan 30, 2020Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- CobaltStrike External C2 for Websockets☆196Jul 16, 2019Updated 6 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆19Jun 16, 2019Updated 6 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- Red Team Tool Kit☆1,131Dec 8, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Red Teaming Tactics and Techniques☆4,586Aug 22, 2024Updated last year
- ☆28Dec 28, 2017Updated 8 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,476Oct 1, 2025Updated 7 months ago
- DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2…☆448Aug 7, 2020Updated 5 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆325Mar 26, 2019Updated 7 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆250Jun 19, 2024Updated last year
- Active Directory ACL exploitation with BloodHound☆762Nov 18, 2021Updated 4 years ago