Small collection of Active Directory pentesting tools.
☆32Jan 29, 2024Updated 2 years ago
Alternatives and similar repositories for active-directory-hacktools
Users that are interested in active-directory-hacktools are comparing it to the libraries listed below
Sorting:
- Indirect NT syscalls LSASS dumper.☆46Jul 9, 2023Updated 2 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 3 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- OSCP preparation☆12Sep 18, 2025Updated 5 months ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- ☆12Apr 5, 2025Updated 10 months ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆175Jul 7, 2025Updated 7 months ago
- Use COM Component Bypass UAC,Dll Version☆36Apr 17, 2021Updated 4 years ago
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated last year
- An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers☆29Feb 21, 2026Updated last week
- ☆17Apr 9, 2024Updated last year
- Man-in-the-middle made easy!☆15Mar 25, 2020Updated 5 years ago
- Native Syscalls Shellcode Injector☆266Jul 2, 2023Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Check if the trust of a ROM image may be affected by the recent Intel Alder Lake leak☆18May 10, 2023Updated 2 years ago
- PoC arbitrary WPM without a process handle☆20Jul 22, 2023Updated 2 years ago
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Dec 6, 2019Updated 6 years ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 3 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆204Jun 23, 2023Updated 2 years ago
- ☆25Oct 1, 2025Updated 4 months ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆52Jul 15, 2023Updated 2 years ago
- ☆22Jul 29, 2021Updated 4 years ago
- A simple PoC crypto ransomware in Python☆19Jul 31, 2016Updated 9 years ago
- Extract text from your DOCX documents.☆11Feb 10, 2024Updated 2 years ago
- Collection of random RedTeam scripts.☆211Mar 8, 2024Updated last year
- Ensemble-HackTools is an awesome collection of hacking tools.☆28May 8, 2024Updated last year
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆27Nov 11, 2022Updated 3 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆407Aug 22, 2023Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆53Jul 28, 2023Updated 2 years ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 7 months ago