A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
☆50Jun 23, 2020Updated 5 years ago
Alternatives and similar repositories for Active-Directory-Exploitation-Cheat-Sheet
Users that are interested in Active-Directory-Exploitation-Cheat-Sheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11May 25, 2021Updated 4 years ago
- A Tool to find subdomains from hackerone reports.☆17Jun 23, 2021Updated 4 years ago
- A list of resources for those interested in getting started in bug bounties☆13Jun 18, 2020Updated 5 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆13Oct 26, 2017Updated 8 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆12Jun 9, 2020Updated 5 years ago
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- ☆44Apr 30, 2021Updated 4 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆71May 8, 2020Updated 5 years ago
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆41Jan 18, 2025Updated last year
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- Magic tricks using grep, sed and awk☆26Jul 28, 2022Updated 3 years ago
- Recon_profile☆38May 18, 2020Updated 5 years ago
- ☆175Oct 26, 2025Updated 4 months ago
- ☆14Oct 1, 2021Updated 4 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 3 years ago
- commands☆27Nov 5, 2020Updated 5 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 10 months ago
- ☆79Apr 29, 2024Updated last year
- ☆34Jun 23, 2021Updated 4 years ago
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆27Jan 6, 2021Updated 5 years ago
- Nuclei Templates - Here you will find the templates I use while hunting☆120Sep 27, 2021Updated 4 years ago
- Oneliners curated from my experience and from the internet☆23Feb 8, 2021Updated 5 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Burp Suite extension to passively scan for applications revealing server error messages☆16Aug 15, 2023Updated 2 years ago
- ☆38Aug 27, 2022Updated 3 years ago
- Tips For Bug Bounty Hunters☆86Jul 16, 2022Updated 3 years ago
- A Payload Injector for bugbounties written in go☆70Jul 18, 2020Updated 5 years ago
- ☆11Dec 25, 2020Updated 5 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in a…☆72Mar 5, 2022Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆28Aug 9, 2018Updated 7 years ago
- Pass list of urls with FUZZ in and it will check if it has found a potential SSRF.☆112Feb 14, 2022Updated 4 years ago
- Vulnerability Cheatsheet☆54Apr 22, 2022Updated 3 years ago
- Python Script for SAML2 Authentication Passwordspray☆40Jul 5, 2023Updated 2 years ago
- ☆11Mar 19, 2019Updated 7 years ago