Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environments. The scripts automate various tasks including LDAP querying, Kerberos ticket analysis, SMB enumeration, and exploitation of known vulnerabilities like Zerologon and PetitPotam.
☆146May 17, 2024Updated last year
Alternatives and similar repositories for AD-AssessmentKit
Users that are interested in AD-AssessmentKit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Powershell tools used for Red Team / Pentesting.☆81Jan 8, 2024Updated 2 years ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆302Feb 2, 2026Updated 2 months ago
- Golang weaponization for red teamers.☆519Jan 17, 2024Updated 2 years ago
- ☆89Jan 2, 2024Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆87Nov 22, 2023Updated 2 years ago
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- Dominate Active Directory with PowerShell.☆1,174Nov 28, 2025Updated 4 months ago
- NetworkAssessment: Network Compromise Assessment Tool☆94May 31, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆46Oct 26, 2025Updated 5 months ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆133Jun 1, 2024Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆484Oct 14, 2022Updated 3 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Simple python script for brute force attack to smtp users☆13Mar 31, 2026Updated 2 weeks ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆129Dec 23, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year
- Powershell script to help Speed up Threat hunting incident response processes☆43Mar 31, 2026Updated 2 weeks ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Nov 12, 2023Updated 2 years ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆515Aug 7, 2024Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆104Jan 19, 2023Updated 3 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An interactive shell to spoof some LOLBins command line☆186Jan 27, 2024Updated 2 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆685Oct 23, 2025Updated 5 months ago
- An aggressor script that can help automate payload building in Cobalt Strike☆118Jan 22, 2024Updated 2 years ago
- ☆188Jan 23, 2024Updated 2 years ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆178Jul 6, 2024Updated last year
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆266Dec 15, 2025Updated 4 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆620Apr 3, 2026Updated last week