Small collection of Active Directory pentesting tools.
☆32Jan 29, 2024Updated 2 years ago
Alternatives and similar repositories for active-directory-hacktools
Users that are interested in active-directory-hacktools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indirect NT syscalls LSASS dumper.☆47Jul 9, 2023Updated 2 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Simple powershell script to find living off land binaries and scripts on a system.☆22Aug 24, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- Use COM Component Bypass UAC,Dll Version☆36Apr 17, 2021Updated 5 years ago
- ☆12Apr 5, 2025Updated last year
- AzureAD Pentest☆25Mar 24, 2022Updated 4 years ago
- Native Syscalls Shellcode Injector☆268Jul 2, 2023Updated 2 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆177Jul 7, 2025Updated 9 months ago
- Man-in-the-middle made easy!☆15Mar 25, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 9 years ago
- ☆18Apr 9, 2024Updated 2 years ago
- ☆29Oct 1, 2025Updated 7 months ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 3 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆205Jun 23, 2023Updated 2 years ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 9 months ago
- Collection of random RedTeam scripts.☆212Mar 8, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Dec 6, 2019Updated 6 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- OSCP preparation☆12Sep 18, 2025Updated 7 months ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆569Jun 5, 2023Updated 2 years ago
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated last year
- An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers☆53Apr 14, 2026Updated 2 weeks ago
- Identify and exploit leaked handles for local privilege escalation.☆112Jun 19, 2023Updated 2 years ago
- Simple script that checks a domain for email protections☆33Jul 29, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆11Apr 25, 2021Updated 5 years ago
- ACL abuse swiss-knife☆129Feb 3, 2023Updated 3 years ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆20Dec 26, 2022Updated 3 years ago
- Exploring in-memory execution of .NET☆138Apr 20, 2022Updated 4 years ago
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆411Mar 16, 2026Updated last month
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆312Aug 2, 2023Updated 2 years ago
- ☆12Oct 10, 2024Updated last year