fuzz-security / Active-Directory-Exploitation-Cheat-SheetLinks
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
☆50Updated 5 years ago
Alternatives and similar repositories for Active-Directory-Exploitation-Cheat-Sheet
Users that are interested in Active-Directory-Exploitation-Cheat-Sheet are comparing it to the libraries listed below
Sorting:
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆19Updated last week
- ☆37Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆44Updated 7 months ago
- Notes for CRTP☆41Updated 4 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- OSWE Preparation☆37Updated 6 years ago
- ☆51Updated 8 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 7 months ago
- ☆14Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆24Updated 4 years ago
- REST API backend for Reconmap☆47Updated last week
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- ☆24Updated 6 years ago
- ☆17Updated 4 years ago
- ☆20Updated 4 years ago
- Template used for my OSCP exam.☆30Updated 3 years ago
- Pentest stuff☆49Updated last year
- A list of "secrets" from JWT sample code and readme files.☆55Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- Attack Surface Discovery Tool☆109Updated 11 months ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- ☆20Updated 4 years ago
- Vulnerable SAML infrastructure training applicaiton☆53Updated 2 years ago
- ☆48Updated 4 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago