This cheatsheet contains Active Directory (AD) exploitation techniques, showcasing methods used to identify and abuse misconfigurations or weaknesses within AD environments.
☆57Jan 22, 2024Updated 2 years ago
Alternatives and similar repositories for Active-Directory-Exploitation
Users that are interested in Active-Directory-Exploitation are comparing it to the libraries listed below
Sorting:
- red team tips and trix☆12Jun 27, 2025Updated 8 months ago
- Collection of red team scripts, resources & configs.☆15Feb 14, 2026Updated 2 weeks ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- ☆18Jan 12, 2026Updated last month
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆11Sep 2, 2020Updated 5 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- 一个基于Rust开发,调用大模型接口完成任务流的工具☆16Sep 8, 2024Updated last year
- various python scripts☆16Jun 15, 2021Updated 4 years ago
- My experience using Windows API for offensive purposes☆17Jul 10, 2021Updated 4 years ago
- ☆19Aug 10, 2022Updated 3 years ago
- ☆18Jan 14, 2026Updated last month
- Notes for CRTP☆42Dec 18, 2020Updated 5 years ago
- ☆23Apr 28, 2024Updated last year
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- ☆46Jan 2, 2022Updated 4 years ago
- Jasmin ransomware web panel path traversal PoC☆21Apr 9, 2024Updated last year
- This repository outlines my OSCP-focused methodology, specifically targeting common port numbers encountered during penetration testing. …☆24Jul 21, 2021Updated 4 years ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- ☆55Sep 13, 2022Updated 3 years ago
- Small utility package for manipulating Windows process tokens☆26Apr 26, 2022Updated 3 years ago
- Cheatsheets and write ups for the CREST CRT and CCT Exams.☆20Aug 5, 2020Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- A rust based DLL injection project☆31Sep 18, 2022Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Jul 18, 2024Updated last year
- PoC for CVE-2021-43557☆22Nov 22, 2021Updated 4 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆126Sep 12, 2024Updated last year
- maldev obviously☆28May 5, 2025Updated 9 months ago
- Convert Cobalt Strike profiles to IIS web.config files☆114Aug 23, 2021Updated 4 years ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- General Content☆25Dec 23, 2025Updated 2 months ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- ☆29May 16, 2023Updated 2 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Feb 13, 2024Updated 2 years ago
- ☆33Feb 28, 2023Updated 3 years ago
- 不依赖驱动的跨平台抓包工具☆33Jan 8, 2023Updated 3 years ago
- CIS & Azure Security Center Hardening recommendations implemented in PowerShell DSC from Azure Automation☆34Jun 10, 2021Updated 4 years ago
- ConvertiX, 一款将常用网络空间测绘平台语句之间互相转换的工具。☆54Aug 25, 2025Updated 6 months ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year