cisagov / ADHuntLinks
Tool for enumerating Active Directory environments
☆48Updated 2 years ago
Alternatives and similar repositories for ADHunt
Users that are interested in ADHunt are comparing it to the libraries listed below
Sorting:
- C2 Automation using Linode☆85Updated 3 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- ☆52Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- ☆109Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆79Updated last week
- A little cheatsheet for NetExec☆32Updated last year
- My Favorite Offensive Security Scripts☆82Updated 9 months ago
- PowerShell Reverse Shell☆80Updated 2 years ago
- A C2 framework built for my bachelors thesis☆56Updated 2 weeks ago
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆56Updated last year
- ☆90Updated 2 years ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆38Updated 9 months ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- Decrypt Chromium based browser passwords with PowerShell.☆133Updated 2 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆126Updated last month
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 8 months ago
- ☆47Updated 3 months ago
- ☆106Updated 11 months ago
- Repo for all my exploits/PoCs☆51Updated 8 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Updated 11 months ago
- ☆63Updated last month
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- A small red team course☆40Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Updated last year
- Duplicate not owned Token from Running Process☆74Updated 2 years ago