expl0itabl3 / Redsheet
Red Teaming & Active Directory Cheat Sheet.
☆40Updated last year
Alternatives and similar repositories for Redsheet:
Users that are interested in Redsheet are comparing it to the libraries listed below
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- ☆27Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆83Updated 2 years ago
- ☆14Updated 3 months ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- ☆52Updated last year
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defend…☆24Updated 10 months ago
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last month
- ☆44Updated 9 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ☆41Updated 2 years ago
- ☆22Updated 3 years ago
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 4 months ago
- Check the Domain for Local Admin Access☆13Updated 2 months ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 2 years ago
- ☆47Updated 3 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 7 months ago