Small collection of Active Directory pentesting tools.
☆32Jan 29, 2024Updated 2 years ago
Alternatives and similar repositories for active-directory-hacktools
Users that are interested in active-directory-hacktools are comparing it to the libraries listed below
Sorting:
- Indirect NT syscalls LSASS dumper.☆47Jul 9, 2023Updated 2 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Feb 26, 2026Updated 3 weeks ago
- Simple powershell script to find living off land binaries and scripts on a system.☆22Aug 24, 2019Updated 6 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- Use COM Component Bypass UAC,Dll Version☆36Apr 17, 2021Updated 4 years ago
- ☆12Apr 5, 2025Updated 11 months ago
- AzureAD Pentest☆25Mar 24, 2022Updated 3 years ago
- Native Syscalls Shellcode Injector☆267Jul 2, 2023Updated 2 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆176Jul 7, 2025Updated 8 months ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- Man-in-the-middle made easy!☆15Mar 25, 2020Updated 5 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- ☆17Apr 9, 2024Updated last year
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- ☆27Oct 1, 2025Updated 5 months ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆203Jun 23, 2023Updated 2 years ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 8 months ago
- Collection of random RedTeam scripts.☆211Mar 8, 2024Updated 2 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Dec 6, 2019Updated 6 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- OSCP preparation☆12Sep 18, 2025Updated 6 months ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆568Jun 5, 2023Updated 2 years ago
- Identify and exploit leaked handles for local privilege escalation.☆111Jun 19, 2023Updated 2 years ago
- An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers☆37Feb 21, 2026Updated last month
- Simple script that checks a domain for email protections☆33Jul 29, 2020Updated 5 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- Exploring in-memory execution of .NET☆137Apr 20, 2022Updated 3 years ago
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆408Aug 22, 2023Updated 2 years ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆314Aug 2, 2023Updated 2 years ago
- ☆12Oct 10, 2024Updated last year
- PoC arbitrary WPM without a process handle☆20Jul 22, 2023Updated 2 years ago