forestallio / ActiveDirectoryRedTeamingLinks
Tools & TTP's for Active Directory Red Teaming
☆30Updated last year
Alternatives and similar repositories for ActiveDirectoryRedTeaming
Users that are interested in ActiveDirectoryRedTeaming are comparing it to the libraries listed below
Sorting:
- Windows for Red Teamers☆127Updated 3 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25Updated 8 months ago
- ☆90Updated 2 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆54Updated 3 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39Updated last year
- Enumeration from a non-domain joined Windows computer☆33Updated last year
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆135Updated 2 years ago
- Active Directory share enumeration tool☆12Updated 9 months ago
- ☆29Updated 4 years ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated 2 years ago
- ☆13Updated 2 years ago
- Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning☆18Updated 3 years ago
- Active Directory Penetration Testing for Red Teams☆58Updated last year
- Active Directory Penetration Testing Tool☆29Updated 4 years ago
- LDAP enumeration tool implemented in Python3☆224Updated 8 months ago
- ☆10Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- OSEP - Offsec Expert Professional☆19Updated last year
- ☆94Updated 6 months ago
- Just an AV slayer. Nothing special ;)☆216Updated 3 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Updated 3 years ago
- A tool to enumerate and exploit SQL Servers in AD☆33Updated 2 years ago
- This cheatsheet contains Active Directory (AD) exploitation techniques, showcasing methods used to identify and abuse misconfigurations o…☆48Updated 2 years ago
- Red Team Guides☆144Updated 2 years ago
- Github action for monitoring CVE☆43Updated this week
- ☆22Updated last year
- All about Active Directory pentesting☆155Updated 5 years ago
- List of some AD tools I frequently use☆56Updated 2 months ago
- ☆19Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago