idnahacks / AD_attack_defend_cheatsheetLinks
A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks
☆22Updated 3 years ago
Alternatives and similar repositories for AD_attack_defend_cheatsheet
Users that are interested in AD_attack_defend_cheatsheet are comparing it to the libraries listed below
Sorting:
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- ☆13Updated last month
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- Find Inbound Email Domains☆24Updated last year
- ☆71Updated last year
- ☆27Updated 2 years ago
- ☆44Updated 11 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Custom queries list for BloodHound☆28Updated 9 months ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Get Fine Grained Password Policy☆70Updated last month
- This repo hosts a poc of how to execute F# code within an unmanaged process☆67Updated 11 months ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- Bypass Constrained Language Mode in PowerShell☆29Updated 6 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆42Updated 2 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- Efflanrs - GUI for Snaffler Output☆26Updated 8 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Collection of tools to use with Azure Applications☆108Updated last year
- Scripts that automate portions of pentests.☆50Updated last month
- Leveraging AWS Lambda Function URLs for C2 Redirection☆35Updated last year
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆19Updated 2 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- ☆47Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago