Red Teaming & Active Directory Cheat Sheet.
☆41Sep 21, 2023Updated 2 years ago
Alternatives and similar repositories for Redsheet
Users that are interested in Redsheet are comparing it to the libraries listed below
Sorting:
- ☆15Aug 17, 2023Updated 2 years ago
- Red Team Stuffs☆19Jul 7, 2022Updated 3 years ago
- This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defend…☆23May 27, 2024Updated last year
- A Python script to find tenant id an region from a list of domain names.☆16Jan 31, 2025Updated last year
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆217Nov 13, 2024Updated last year
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆38Dec 5, 2025Updated 2 months ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Jul 31, 2022Updated 3 years ago
- Multithreaded spraying of a password on all accounts of a domain.☆26Feb 11, 2025Updated last year
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- ☆14Feb 12, 2026Updated 2 weeks ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- MSBuild Without MSBuild.exe☆155Dec 21, 2020Updated 5 years ago
- Web Hacking and Red Teaming MindMap☆78Dec 24, 2025Updated 2 months ago
- ☆25Jan 11, 2023Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Mar 25, 2025Updated 11 months ago
- Advanced AWS Access Credentials Scanner ⚡☆13Apr 26, 2023Updated 2 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 2 years ago
- exp for useful vuln☆12Jul 9, 2021Updated 4 years ago
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆17Aug 24, 2025Updated 6 months ago
- QNAP N-Day (Probably not CVE-2020-2509)☆14Jul 27, 2022Updated 3 years ago
- Webshell with the newest, easiest, and shortest code and technique.☆10Oct 23, 2021Updated 4 years ago
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- ☆15May 19, 2020Updated 5 years ago
- ☆12Jun 27, 2019Updated 6 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11May 14, 2025Updated 9 months ago
- ☆11Jan 11, 2026Updated last month
- This script is to build Wazuh 4.3 environment☆11May 30, 2022Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86May 5, 2023Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆32Apr 13, 2022Updated 3 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆37Jul 27, 2021Updated 4 years ago