Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environments. The scripts automate various tasks including LDAP querying, Kerberos ticket analysis, SMB enumeration, and exploitation of known vulnerabilities like Zerologon and PetitPotam.
☆146May 17, 2024Updated last year
Alternatives and similar repositories for AD-AssessmentKit
Users that are interested in AD-AssessmentKit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Powershell tools used for Red Team / Pentesting.☆83Jan 8, 2024Updated 2 years ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆302Feb 2, 2026Updated 3 months ago
- Golang weaponization for red teamers.☆519Jan 17, 2024Updated 2 years ago
- ☆89Jan 2, 2024Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆165Apr 27, 2024Updated 2 years ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆87Nov 22, 2023Updated 2 years ago
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- Dominate Active Directory with PowerShell.☆1,182Nov 28, 2025Updated 5 months ago
- NetworkAssessment: Network Compromise Assessment Tool☆94May 31, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆45Oct 26, 2025Updated 6 months ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆485Oct 14, 2022Updated 3 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆134Jun 1, 2024Updated last year
- Simple python script for brute force attack to smtp users☆13Mar 31, 2026Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆130Dec 23, 2025Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Powershell script to help Speed up Threat hunting incident response processes☆43Mar 31, 2026Updated last month
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Nov 12, 2023Updated 2 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Sep 13, 2024Updated last year
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆517Aug 7, 2024Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆104Jan 19, 2023Updated 3 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- An interactive shell to spoof some LOLBins command line☆187Jan 27, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆689Oct 23, 2025Updated 6 months ago
- An aggressor script that can help automate payload building in Cobalt Strike☆118Jan 22, 2024Updated 2 years ago
- ☆188Jan 23, 2024Updated 2 years ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆178Jul 6, 2024Updated last year
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆267Dec 15, 2025Updated 4 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆622Apr 3, 2026Updated last month
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago