Notes on Active Directory analysis and exploitation
☆11Mar 7, 2019Updated 7 years ago
Alternatives and similar repositories for Active-Directory-Fun
Users that are interested in Active-Directory-Fun are comparing it to the libraries listed below
Sorting:
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Oct 1, 2020Updated 5 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- A list of examples and references of hacking with Bash and the Curl command☆57Feb 27, 2020Updated 6 years ago
- Tips and Tricks for Linux Priv Escalation☆226Sep 5, 2021Updated 4 years ago
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- ☆15May 17, 2018Updated 7 years ago
- A tool that executes any command or application provisioning its environment with variables from providers (like secrets from Vault).☆11Jul 23, 2024Updated last year
- Single Page Cheatsheet for common MSF Venom One Liners☆308Apr 25, 2019Updated 6 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- Notes and Commands for CTFs☆22Apr 28, 2020Updated 5 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆14Aug 17, 2022Updated 3 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Aug 23, 2021Updated 4 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated 3 weeks ago
- Handy Stored Password Decryption Techniques☆164Jun 9, 2021Updated 4 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- This package allows you to check whether an IP address belongs to a hosting provider or not. In case the IP address can be successfully l…☆21Oct 22, 2023Updated 2 years ago
- https://github.com/OlivierLaflamme/Cheatsheet-God☆18Jul 10, 2021Updated 4 years ago
- Various exploit scripts and code snippets I've created over the years for HTB, Vulnhub, CTFs, etc.☆24Sep 28, 2018Updated 7 years ago
- A simple Bash Script to Bypass Spotify Ads.☆10Jul 7, 2021Updated 4 years ago
- Compiled binaries of various security tools☆14May 19, 2021Updated 4 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- 透過線上購物網站來實際操作來體驗 OWASP Top 10 各項資安問題☆11Nov 23, 2021Updated 4 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- ☆14Jun 16, 2025Updated 9 months ago
- ☆23Jan 18, 2021Updated 5 years ago