A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks
☆23Jun 22, 2021Updated 4 years ago
Alternatives and similar repositories for AD_attack_defend_cheatsheet
Users that are interested in AD_attack_defend_cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- ☆70Feb 12, 2026Updated 2 months ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Dec 11, 2023Updated 2 years ago
- Frontend for MalShare.com☆18Apr 25, 2026Updated last week
- Network penetration testing toolset wrapper☆81Jul 5, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Microsoft Telnet Server MS-TNAP Authentication Bypass Exploit☆22Apr 28, 2025Updated last year
- Cross-platform Rust library to prompt for things in console applications (Linux, BSD, OSX, Windows).☆15Apr 25, 2026Updated last week
- Go bindings for YARA☆14Aug 24, 2025Updated 8 months ago
- ☆15Dec 26, 2017Updated 8 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 10 months ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆40Jul 23, 2025Updated 9 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆63Apr 13, 2025Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Poc script for ProxyShell exploit chain in Exchange Server☆24Feb 24, 2022Updated 4 years ago
- Public tools, scripts or code snippets that can help when working with our products☆47Mar 12, 2026Updated last month
- Terraform + Ansible deployment scripts for an Active Directory lab environment.☆281Feb 24, 2023Updated 3 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 4 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- ☆12Jun 3, 2022Updated 3 years ago
- A repository of output using KAPE (!EZParser Module) for various publicly available forensic images!☆17Aug 31, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- LDAP parser written in pure Rust. Fast, zero-copy, safe.☆13Jan 19, 2026Updated 3 months ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- ☆26Dec 21, 2025Updated 4 months ago
- Lateral movement with DCOM DLL hijacking☆178Jul 4, 2025Updated 10 months ago
- WPF helper library☆14Apr 6, 2019Updated 7 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆486Jul 9, 2024Updated last year
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆19Feb 20, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Apr 14, 2026Updated 2 weeks ago
- ☆21May 8, 2022Updated 3 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- # Keylogger-BOF☆46Mar 13, 2026Updated last month
- My lab notes and learning progress for the PortSwigger Web Security Academy's SQL Injection chapter.☆12Aug 10, 2023Updated 2 years ago
- ☆33Jan 25, 2021Updated 5 years ago