florylsk / active-directory-hacktools
Small collection of Active Directory pentesting tools.
☆29Updated last year
Alternatives and similar repositories for active-directory-hacktools:
Users that are interested in active-directory-hacktools are comparing it to the libraries listed below
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Cobalt Strike BOFS☆15Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆43Updated last year
- ☆17Updated 5 months ago
- LSTAR - CobaltStrike Translated to EN☆13Updated last year
- ☆26Updated last year
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆18Updated this week
- ☆13Updated 2 months ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- Custom mini tools during Red Teaming engagements☆12Updated 3 weeks ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 9 months ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 2 months ago
- ☆26Updated last year
- miscellaneous sploit scripts/hacks☆16Updated last month
- Enumerate the Domain for Readable and Writable Shares☆17Updated last month
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated this week
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated last year
- A small red team course☆36Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated last year
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆11Updated 11 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year