A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that may be discovered during a penetration test.
☆256Aug 31, 2022Updated 3 years ago
Alternatives and similar repositories for pen-testing-findings
Users that are interested in pen-testing-findings are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Azure Security Resources and Notes☆1,730Feb 17, 2026Updated last month
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 4 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,511Mar 18, 2026Updated 3 weeks ago
- ☆615Jun 1, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,900Oct 29, 2025Updated 5 months ago
- ☆52Feb 8, 2024Updated 2 years ago
- ☆121Mar 18, 2026Updated 3 weeks ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,807Sep 17, 2024Updated last year
- CVE-2023-1671-POC, based on dnslog platform☆17Apr 26, 2023Updated 2 years ago
- Jumpstart multiple WebSocket servers quickly☆33Nov 23, 2021Updated 4 years ago
- Active Directory Auditing and Enumeration☆524Mar 31, 2026Updated last week
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆903Mar 31, 2026Updated last week
- Awesome List of Enterprise Security Tools' Community Edition☆16Nov 10, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆373Mar 24, 2026Updated 2 weeks ago
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,571Feb 5, 2026Updated 2 months ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆261Mar 2, 2026Updated last month
- A collection of companies that disclose adversary TTPs after they have been breached☆289Mar 14, 2026Updated 3 weeks ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,494Updated this week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆379Dec 23, 2025Updated 3 months ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆277May 10, 2024Updated last year
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,258Mar 19, 2026Updated 3 weeks ago
- Assess the security of your Active Directory with few or all privileges.☆366Mar 16, 2026Updated 3 weeks ago
- A Red Team Activity Hub☆235Mar 27, 2026Updated last week
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,275Dec 9, 2025Updated 4 months ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆40Jul 23, 2025Updated 8 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automating situational awareness for cloud penetration tests.☆2,335Mar 24, 2026Updated 2 weeks ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆625Feb 16, 2026Updated last month
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,808May 22, 2024Updated last year
- PowerShell framework to assess Azure security☆1,264Oct 18, 2025Updated 5 months ago
- A PowerShell script that automates the security assessment of Microsoft 365 environments.☆651Apr 8, 2025Updated last year
- Tools & Interesting Things for RedTeam Ops☆2,265Feb 10, 2026Updated last month
- Fully modular persistence framework☆259Apr 10, 2023Updated 2 years ago