A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
☆25Feb 24, 2023Updated 3 years ago
Alternatives and similar repositories for Active-Directory-Exploitation-Cheat-Sheet
Users that are interested in Active-Directory-Exploitation-Cheat-Sheet are comparing it to the libraries listed below
Sorting:
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- ☆13Mar 7, 2025Updated last year
- Internal Network Penetration Test Playbook☆17Apr 18, 2022Updated 3 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 3 years ago
- ☆30Mar 2, 2023Updated 3 years ago
- Python Gmail User Enumeration Tool☆16Jul 13, 2025Updated 7 months ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆41Sep 23, 2023Updated 2 years ago
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Oct 25, 2021Updated 4 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Raspberry Pi Smart Bartender☆14Apr 22, 2022Updated 3 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Publicly available training resources used by Security PS to train application security engineers☆10Feb 16, 2021Updated 5 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Inspired by the Tryhackme.com Room "Python for Pentesters"☆10Jun 9, 2024Updated last year
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Apr 19, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Synchronize properties from your Obsidian notes with a Markwhen timeline file.☆12Sep 20, 2025Updated 5 months ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- Extract most frequent words in a list of subdomains☆12Feb 15, 2025Updated last year
- ☆16Jun 21, 2024Updated last year
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- ☆10May 6, 2017Updated 8 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- Unofficial micro-architecture optimized hardened_malloc package☆13Updated this week
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- Keep Your Sandbox Tight! – Actually just a collection of my own tight sandbox configurations.☆16Jan 22, 2025Updated last year
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- ☆14Jan 2, 2026Updated 2 months ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated 3 weeks ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 8 months ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆14Oct 18, 2023Updated 2 years ago