A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that may be discovered during a penetration test.
☆256Aug 31, 2022Updated 3 years ago
Alternatives and similar repositories for pen-testing-findings
Users that are interested in pen-testing-findings are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Azure Security Resources and Notes☆1,738Feb 17, 2026Updated 2 months ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆21Apr 16, 2026Updated last week
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,515Mar 18, 2026Updated last month
- ☆615Jun 1, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,907Oct 29, 2025Updated 6 months ago
- ☆51Feb 8, 2024Updated 2 years ago
- ☆121Mar 18, 2026Updated last month
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,812Apr 6, 2026Updated 3 weeks ago
- CVE-2023-1671-POC, based on dnslog platform☆17Apr 26, 2023Updated 3 years ago
- Jumpstart multiple WebSocket servers quickly☆33Nov 23, 2021Updated 4 years ago
- Active Directory Auditing and Enumeration☆528Mar 31, 2026Updated 3 weeks ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆912Updated this week
- Awesome List of Enterprise Security Tools' Community Edition☆16Nov 10, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆375Mar 24, 2026Updated last month
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,513Apr 20, 2026Updated last week
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,597Feb 5, 2026Updated 2 months ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆262Mar 2, 2026Updated last month
- A collection of companies that disclose adversary TTPs after they have been breached☆289Mar 14, 2026Updated last month
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,821May 22, 2024Updated last year
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆277May 10, 2024Updated last year
- A tool to query for the existence of pre-windows 2000 computer objects.☆383Dec 23, 2025Updated 4 months ago
- Assess the security of your Active Directory with few or all privileges.☆368Mar 16, 2026Updated last month
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,267Apr 15, 2026Updated 2 weeks ago
- A Red Team Activity Hub☆237Apr 14, 2026Updated 2 weeks ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated 2 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,277Updated this week
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆40Jul 23, 2025Updated 9 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Automating situational awareness for cloud penetration tests.☆2,363Apr 21, 2026Updated last week
- ScriptSentry finds misconfigured and dangerous logon scripts.☆628Feb 16, 2026Updated 2 months ago
- PowerShell framework to assess Azure security☆1,269Oct 18, 2025Updated 6 months ago
- A PowerShell script that automates the security assessment of Microsoft 365 environments.☆654Apr 8, 2025Updated last year
- Tools & Interesting Things for RedTeam Ops☆2,271Feb 10, 2026Updated 2 months ago
- Fully modular persistence framework☆259Apr 10, 2023Updated 3 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago