idnahacks / AD_attack_defend_cheatsheet
A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks
☆21Updated 3 years ago
Alternatives and similar repositories for AD_attack_defend_cheatsheet:
Users that are interested in AD_attack_defend_cheatsheet are comparing it to the libraries listed below
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆37Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- ☆12Updated last week
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated 11 months ago
- ☆71Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Living off the land searches for explorer and sharepoint☆59Updated 5 months ago
- ☆26Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- ☆43Updated 8 months ago
- Find Inbound Email Domains☆22Updated last year
- An Ansible collection that installs an ADFS deployment with optional configurations.☆28Updated 3 months ago
- ☆47Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆60Updated 2 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated last year
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆55Updated last month
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- ☆52Updated last week
- Discord C2 Profile for Mythic☆28Updated last month
- ☆20Updated last year
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Windows Post-Exploitation tools wrapper☆12Updated 9 months ago
- fully async implementation of Dirkjan's ROADTools☆31Updated 2 weeks ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year