List of tools and resources for pentesting Microsoft Active Directory
☆117Jul 1, 2025Updated 8 months ago
Alternatives and similar repositories for ActiveDirectory-Pentest-Resources
Users that are interested in ActiveDirectory-Pentest-Resources are comparing it to the libraries listed below
Sorting:
- ☆13Mar 7, 2025Updated last year
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆22Aug 21, 2023Updated 2 years ago
- ☆48Oct 15, 2025Updated 4 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆214Apr 11, 2020Updated 5 years ago
- OSCP Cheatsheet☆16Jun 14, 2023Updated 2 years ago
- PowerShell & Python tools developed for CTFs and certification exams☆70Aug 10, 2025Updated 6 months ago
- Learning resources and external resources to help you prepare for your offsec certifications☆102Nov 1, 2024Updated last year
- Knowledge Management for Offensive Security Professionals Official Repository☆151Feb 25, 2025Updated last year
- CommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection☆28Updated this week
- Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)☆49Oct 2, 2024Updated last year
- ☆15Mar 12, 2025Updated 11 months ago
- List of some AD tools I frequently use☆56Nov 2, 2025Updated 4 months ago
- ☆12Aug 5, 2023Updated 2 years ago
- HTB recon tool to simplify part of the enumeration process☆13May 14, 2025Updated 9 months ago
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆672Oct 23, 2025Updated 4 months ago
- This exploit allows to connect to the remote RemoteMouse 3.008 service to virtually press arbitrary keys and execute code on the machine.☆65Feb 11, 2025Updated last year
- HackTheBox Certified Penetration Tester Specialist Cheatsheet☆702Jul 10, 2024Updated last year
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- ☆59Jun 2, 2025Updated 9 months ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- ☆16Aug 2, 2025Updated 7 months ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Pentesting Apache Tomcat 101☆14Apr 4, 2023Updated 2 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- ☆12Mar 27, 2024Updated last year
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- Multiplayer pivoting solution☆489Updated this week
- Lab used for workshop and CTF☆500Feb 3, 2026Updated last month
- ☆210Mar 4, 2022Updated 4 years ago
- Capture. Detonate. Collect☆14Sep 20, 2024Updated last year
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- Kerberoast with ACL abuse capabilities☆619Dec 16, 2024Updated last year
- Active Directory Auditing and Enumeration☆521Dec 3, 2025Updated 3 months ago
- ResearchDev - XDR & SIEM Detection☆67Apr 16, 2025Updated 10 months ago
- A cheatsheet for NetExec☆197Jun 9, 2025Updated 9 months ago
- GitHub repository for the API Security for White Hat Hackers book☆15May 31, 2024Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆13Nov 7, 2022Updated 3 years ago
- Mythic C2 CheatSheet for OSEP☆61Jan 21, 2026Updated last month