cisagov / pen-testing-findingsView external linksLinks
A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that may be discovered during a penetration test.
☆256Aug 31, 2022Updated 3 years ago
Alternatives and similar repositories for pen-testing-findings
Users that are interested in pen-testing-findings are comparing it to the libraries listed below
Sorting:
- ☆120Oct 5, 2022Updated 3 years ago
- Azure Security Resources and Notes☆1,707Feb 2, 2026Updated 2 weeks ago
- ☆617Jun 1, 2023Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,471Jan 23, 2026Updated 3 weeks ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,804Sep 17, 2024Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,897Oct 29, 2025Updated 3 months ago
- ☆52Feb 8, 2024Updated 2 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆259Jan 23, 2026Updated 3 weeks ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- Active Directory Auditing and Enumeration☆515Dec 3, 2025Updated 2 months ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,516Feb 5, 2026Updated last week
- A tool to query for the existence of pre-windows 2000 computer objects.☆366Dec 23, 2025Updated last month
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆886Updated this week
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,468Dec 31, 2025Updated last month
- Assess the security of your Active Directory with few or all privileges.☆341Jan 31, 2026Updated 2 weeks ago
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.☆1,177Dec 27, 2023Updated 2 years ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆622Dec 20, 2024Updated last year
- CVE-2023-1671-POC, based on dnslog platform☆17Apr 26, 2023Updated 2 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- A collection of scripts for assessing Microsoft Azure security☆2,300Oct 29, 2025Updated 3 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Dec 7, 2025Updated 2 months ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆273May 10, 2024Updated last year
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,685Jan 8, 2024Updated 2 years ago
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,234Feb 4, 2026Updated last week
- A Red Team Activity Hub☆235Feb 4, 2026Updated last week
- PowerShell framework to assess Azure security☆1,253Oct 18, 2025Updated 3 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Nov 6, 2023Updated 2 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆503May 16, 2023Updated 2 years ago
- game of active directory☆7,437Jul 16, 2025Updated 7 months ago
- libflutter.so(s) modified for traffic intercepting removing certificate pinning validation. Dart version is 2.10.5☆12Jul 11, 2021Updated 4 years ago
- Tools & Interesting Things for RedTeam Ops☆2,250Updated this week
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Nov 11, 2025Updated 3 months ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆35Jul 23, 2025Updated 6 months ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago