A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that may be discovered during a penetration test.
☆256Aug 31, 2022Updated 3 years ago
Alternatives and similar repositories for pen-testing-findings
Users that are interested in pen-testing-findings are comparing it to the libraries listed below
Sorting:
- Azure Security Resources and Notes☆1,716Feb 17, 2026Updated last month
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,478Jan 23, 2026Updated last month
- ☆613Jun 1, 2023Updated 2 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,900Oct 29, 2025Updated 4 months ago
- ☆52Feb 8, 2024Updated 2 years ago
- ☆120Oct 5, 2022Updated 3 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,806Sep 17, 2024Updated last year
- CVE-2023-1671-POC, based on dnslog platform☆17Apr 26, 2023Updated 2 years ago
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- Active Directory Auditing and Enumeration☆521Dec 3, 2025Updated 3 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆898Mar 11, 2026Updated last week
- Awesome List of Enterprise Security Tools' Community Edition☆16Nov 10, 2023Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Updated this week
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,542Feb 5, 2026Updated last month
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆258Mar 2, 2026Updated 2 weeks ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,478Dec 31, 2025Updated 2 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Updated this week
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆374Dec 23, 2025Updated 2 months ago
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,244Mar 11, 2026Updated last week
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆275May 10, 2024Updated last year
- Assess the security of your Active Directory with few or all privileges.☆360Updated this week
- A Red Team Activity Hub☆235Mar 5, 2026Updated 2 weeks ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,269Dec 9, 2025Updated 3 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- Automating situational awareness for cloud penetration tests.☆2,309Mar 10, 2026Updated last week
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆39Jul 23, 2025Updated 7 months ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆626Feb 16, 2026Updated last month
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,782May 22, 2024Updated last year
- PowerShell framework to assess Azure security☆1,261Oct 18, 2025Updated 5 months ago
- Tools & Interesting Things for RedTeam Ops☆2,260Feb 10, 2026Updated last month
- Fully modular persistence framework☆259Apr 10, 2023Updated 2 years ago
- game of active directory☆7,581Mar 12, 2026Updated last week
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago