forestallio / ActiveDirectoryRedTeamingLinks
Tools & TTP's for Active Directory Red Teaming
☆30Updated 11 months ago
Alternatives and similar repositories for ActiveDirectoryRedTeaming
Users that are interested in ActiveDirectoryRedTeaming are comparing it to the libraries listed below
Sorting:
- Windows for Red Teamers☆126Updated 3 years ago
- Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning☆18Updated 3 years ago
- Enumeration from a non-domain joined Windows computer☆32Updated last year
- ☆91Updated 2 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆23Updated 6 months ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆130Updated 2 years ago
- Our repo for crushing through RTO course & labs.☆35Updated 3 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆185Updated 2 years ago
- All about Active Directory pentesting☆150Updated 4 years ago
- LDAP enumeration tool implemented in Python3☆223Updated 6 months ago
- Just an AV slayer. Nothing special ;)☆215Updated 3 years ago
- Active Directory Penetration Testing Tool☆28Updated 4 years ago
- My Favorite Offensive Security Scripts☆76Updated 6 months ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆53Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 2 years ago
- ☆99Updated 3 years ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated 2 years ago
- Active Directory Penetration Testing for Red Teams☆58Updated last year
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆113Updated last year
- OSEP - Offsec Expert Professional☆16Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- Awesome Privilege Escalation☆134Updated 3 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated 2 years ago
- This cheatsheet contains Active Directory (AD) exploitation techniques, showcasing methods used to identify and abuse misconfigurations o…☆43Updated last year
- Spoofcheck☆45Updated 6 months ago
- ☆13Updated 2 years ago
- ☆29Updated 4 years ago
- ☆91Updated 4 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated 2 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆138Updated 2 years ago