lucky-luk3 / ActiveDirectoryView external linksLinks
Apuntes Pentesting a ActiveDirectory PentesterAcademy
☆22Jun 9, 2019Updated 6 years ago
Alternatives and similar repositories for ActiveDirectory
Users that are interested in ActiveDirectory are comparing it to the libraries listed below
Sorting:
- Collection of red team scripts, resources & configs.☆15May 9, 2025Updated 9 months ago
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- Some talks about security☆13Nov 20, 2020Updated 5 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 5 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆17Aug 18, 2020Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- ☆74Jun 17, 2025Updated 7 months ago
- Process inject technique "Thread hijacking" via csharp☆15Dec 18, 2021Updated 4 years ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆25May 6, 2025Updated 9 months ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆19Mar 11, 2023Updated 2 years ago
- ☆45Oct 19, 2021Updated 4 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 3 years ago
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆48Oct 6, 2021Updated 4 years ago
- This repository outlines my OSCP-focused methodology, specifically targeting common port numbers encountered during penetration testing. …☆24Jul 21, 2021Updated 4 years ago
- use shellcode as asm function☆23Mar 29, 2022Updated 3 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- ☆57Mar 25, 2024Updated last year
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆44Jul 9, 2025Updated 7 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25May 21, 2025Updated 8 months ago
- PEN-300/OSEP Public resources for PEN-300 Training☆125Sep 2, 2021Updated 4 years ago
- A small go tool to upload JSON files to the BloodHound community edition API☆30May 29, 2024Updated last year
- Bypass Constrained Language Mode in PowerShell☆30May 21, 2019Updated 6 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- DirSync is a simple proof of concept PowerShell module to demonstrate the impact of delegating DS-Replication-Get-Changes and DS-Replicat…☆29Apr 26, 2023Updated 2 years ago
- Bcheck scripts for Burp☆28Aug 7, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Apr 20, 2025Updated 9 months ago
- Command line & PPID spoofing☆29Apr 15, 2023Updated 2 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Lateral Movement☆125Nov 14, 2023Updated 2 years ago
- ☆28Oct 5, 2020Updated 5 years ago
- ☆235Oct 8, 2024Updated last year
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- Command line nmap XML parser☆31Feb 3, 2024Updated 2 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago