A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that may be discovered during a penetration test.
☆256Aug 31, 2022Updated 3 years ago
Alternatives and similar repositories for pen-testing-findings
Users that are interested in pen-testing-findings are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Azure Security Resources and Notes☆1,747Feb 17, 2026Updated 3 months ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆21Apr 16, 2026Updated last month
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆402Jan 10, 2025Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,522Mar 18, 2026Updated 2 months ago
- ☆614Jun 1, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,911Oct 29, 2025Updated 6 months ago
- ☆51Feb 8, 2024Updated 2 years ago
- ☆121Mar 18, 2026Updated 2 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,818Apr 6, 2026Updated last month
- CVE-2023-1671-POC, based on dnslog platform☆17Apr 26, 2023Updated 3 years ago
- Jumpstart multiple WebSocket servers quickly☆33Nov 23, 2021Updated 4 years ago
- Active Directory Auditing and Enumeration☆530Mar 31, 2026Updated last month
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆916May 7, 2026Updated last week
- Awesome List of Enterprise Security Tools' Community Edition☆16Nov 10, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆181Feb 14, 2023Updated 3 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆377Mar 24, 2026Updated last month
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,518Apr 20, 2026Updated last month
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,602Feb 5, 2026Updated 3 months ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆263Mar 2, 2026Updated 2 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆300May 11, 2026Updated last week
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,829May 22, 2024Updated last year
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆279May 10, 2024Updated 2 years ago
- Assess the security of your Active Directory with few or all privileges.☆372May 3, 2026Updated 2 weeks ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆388Dec 23, 2025Updated 4 months ago
- Monkey365 is an open-source security assessment tool for Microsoft 365, Azure, and Microsoft Entra ID. It helps security professionals id…☆1,278Updated this week
- A Red Team Activity Hub☆236Updated this week
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated 2 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,281Apr 23, 2026Updated 3 weeks ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆40Jul 23, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Automating situational awareness for cloud penetration tests.☆2,382Apr 21, 2026Updated 3 weeks ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆641Feb 16, 2026Updated 3 months ago
- PowerShell framework to assess Azure security☆1,275Oct 18, 2025Updated 7 months ago
- A PowerShell script that automates the security assessment of Microsoft 365 environments.☆655Apr 8, 2025Updated last year
- Tools & Interesting Things for RedTeam Ops☆2,275Feb 10, 2026Updated 3 months ago
- Fully modular persistence framework☆259Apr 10, 2023Updated 3 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆326Jun 18, 2023Updated 2 years ago