Notes on Active Directory analysis and exploitation
☆11Mar 7, 2019Updated 6 years ago
Alternatives and similar repositories for Active-Directory-Fun
Users that are interested in Active-Directory-Fun are comparing it to the libraries listed below
Sorting:
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Oct 1, 2020Updated 5 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 11 months ago
- ☆15May 17, 2018Updated 7 years ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- ☆17Mar 10, 2018Updated 7 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Tips and Tricks for Linux Priv Escalation☆225Sep 5, 2021Updated 4 years ago
- OSCP Scripts☆14Jan 21, 2016Updated 10 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Nov 5, 2020Updated 5 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- Single Page Cheatsheet for common MSF Venom One Liners☆308Apr 25, 2019Updated 6 years ago
- Pentesting resources☆23May 3, 2019Updated 6 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆32Nov 17, 2019Updated 6 years ago
- A list of examples and references of hacking with Bash and the Curl command☆57Feb 27, 2020Updated 6 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆34Feb 9, 2025Updated last year
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Feb 19, 2020Updated 6 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- ☆27Jul 29, 2024Updated last year
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- ☆36Mar 28, 2025Updated 11 months ago
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- Web for Pentester I☆11Sep 21, 2018Updated 7 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Updated this week