Scripts and piece of codes used for Active Directory configuration
☆83Feb 14, 2023Updated 3 years ago
Alternatives and similar repositories for AD-Config-Automation
Users that are interested in AD-Config-Automation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Application for administer multidomain Active Directory-based networks☆29Dec 4, 2025Updated 5 months ago
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 4 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- A simple pentest container equipped with common python pentest tools.☆44Jan 30, 2026Updated 3 months ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆168Feb 29, 2024Updated 2 years ago
- Checklists for Testing Security environment☆899Mar 12, 2025Updated last year
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Dec 22, 2023Updated 2 years ago
- ☆10Feb 15, 2023Updated 3 years ago
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 4 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- ☆159Nov 26, 2023Updated 2 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repo is about Active Directory Advanced Threat Hunting☆650Feb 17, 2025Updated last year
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- ☆18Jun 25, 2024Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- Kill AV/EDR leveraging BYOVD attack☆400Jul 11, 2023Updated 2 years ago
- ☆25Aug 2, 2023Updated 2 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A compilation of important commands, files, and tools used in Pentesting☆56Jan 17, 2023Updated 3 years ago
- All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming☆233Oct 8, 2024Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆195Feb 24, 2026Updated 2 months ago
- This is a repository for network security tools and technologies.☆101Nov 6, 2022Updated 3 years ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆171Nov 17, 2023Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆22Feb 12, 2023Updated 3 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- ☆12Mar 18, 2025Updated last year
- Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend…☆41Sep 9, 2024Updated last year
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,517Nov 21, 2025Updated 5 months ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆622Apr 3, 2026Updated last month