This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial reconnaissance to advanced persistence techniques.
☆21Jul 3, 2025Updated 9 months ago
Alternatives and similar repositories for Active_Directory_Roadmap
Users that are interested in Active_Directory_Roadmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆23Aug 25, 2024Updated last year
- ☆25Jan 5, 2026Updated 3 months ago
- TechackZ is a powerful web technology detection and vulnerability assessment tool that combines the capabilities of Wappalyzer and Nuclei…☆67Jun 4, 2025Updated 10 months ago
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆15Aug 22, 2024Updated last year
- PoC collection☆13Oct 1, 2020Updated 5 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆22Feb 12, 2023Updated 3 years ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆86Mar 20, 2025Updated last year
- A quick bug bounty guide for beginners☆92May 3, 2025Updated 11 months ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- Exercise files for Projectsecurity Enterprise 101 Module.☆44Jan 9, 2025Updated last year
- ☆10Jan 9, 2026Updated 3 months ago
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆15Mar 26, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Hands-on projects for beginners to learn and practice Active Directory monitoring using various tools.☆188Jun 21, 2024Updated last year
- ☆10Aug 28, 2020Updated 5 years ago
- Informatrion Gathering Framework☆23Aug 28, 2022Updated 3 years ago
- Read-Only Mirror☆26Apr 9, 2026Updated last week
- DeepWeb is a tool that extracts links from a webpage and does a deep analysis on every link.☆26Jul 12, 2023Updated 2 years ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 10 months ago
- Educational collection of LLVM obfuscation passes. (Feel free to use it for your course)☆33Nov 16, 2025Updated 5 months ago
- Front de la pagina Machete Exactas para subir resueltos y demas de las materias de FCEN UBA☆13Sep 24, 2024Updated last year
- A lightweight OSINT tool for performing WHOIS checks, DNS lookups, email harvesting, and social media scanning.☆26Jun 6, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- MongoDB CVE-2025-14847 Heap Memory Leak Scanner | OP_COMPRESSED zlib Vulnerability | Bug Bounty & Red Team Tool☆35Dec 28, 2025Updated 3 months ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- Collection of notes and scripts I used during my OSCP exam preparation.☆42Dec 21, 2025Updated 3 months ago
- crack and generate jwt with ease☆22Mar 23, 2025Updated last year
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Argument injection vulnerability in PHP☆13Jun 15, 2024Updated last year
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Tool to get NT system shell .☆11Jun 29, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An essential collection of 42 School curriculum project PDFs in English and French, thoughtfully organized for students navigating the co…☆19Dec 10, 2023Updated 2 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆18Feb 19, 2017Updated 9 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Automated GitHub secret scanning with smart alerting & monitoring.☆31Jan 15, 2026Updated 3 months ago
- Practical Bug Bounty Hunting for Hackers and Pentesters, by EC-Council☆24Oct 6, 2021Updated 4 years ago
- UPS has developed Software Development Kits (SDKs) to be used as a low-code solution for customers wishing to integrate with UPS APIs. Th…☆37Jan 28, 2025Updated last year
- Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability.☆45Feb 10, 2026Updated 2 months ago