A Network Enumeration and Attack Toolset for Windows Active Directory Environments.
β250Jun 19, 2024Updated last year
Alternatives and similar repositories for ActiveReign
Users that are interested in ActiveReign are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- For all your network pentesting needsβ153Jun 26, 2024Updated last year
- Enumerate information from NTLM authentication enabled web endpoints πβ508Sep 23, 2025Updated 7 months ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and usβ¦β576Jun 19, 2024Updated last year
- β128May 22, 2023Updated 2 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.β443Apr 1, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Port of Invoke-Excel4DCOMβ104Oct 12, 2019Updated 6 years ago
- A curated list of awesome BloodhoundAD resourcesβ237Oct 13, 2022Updated 3 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operationsβ354Dec 1, 2020Updated 5 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environmentsβ318Dec 19, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.β782Jun 20, 2020Updated 5 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLLβsβ332Oct 20, 2019Updated 6 years ago
- ObscurityLabs RedTeam C# Toolkitβ121Sep 3, 2019Updated 6 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelistingβ825May 1, 2026Updated 2 weeks ago
- β333Dec 8, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A C# tool to search through a running instance of Outlook for keywordsβ111Jan 14, 2021Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testersβ817Aug 28, 2022Updated 3 years ago
- Abusing Exchange via EWSβ153Sep 14, 2020Updated 5 years ago
- Create a minidump of the LSASS process from memoryβ259Nov 2, 2022Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is uβ¦β610Mar 2, 2021Updated 5 years ago
- β127Jun 19, 2020Updated 5 years ago
- β351Feb 21, 2022Updated 4 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale vβ¦β449May 25, 2022Updated 3 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at sβ¦β544Sep 18, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.β400May 20, 2020Updated 6 years ago
- Detect and abuse risky SPNsβ267Jun 15, 2017Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application contβ¦β351Aug 27, 2018Updated 7 years ago
- gather gather gatherβ587Mar 15, 2025Updated last year
- My musings with C#β28Dec 23, 2022Updated 3 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.β248Sep 9, 2021Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundledβ145Mar 17, 2026Updated 2 months ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.β382Apr 28, 2020Updated 6 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash toβ¦β180Sep 11, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- lateral movement techniques that can be used during red team exercisesβ278Jan 13, 2020Updated 6 years ago
- Extract credentials from lsass remotelyβ2,202Mar 23, 2026Updated last month
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Intβ¦β142Dec 8, 2022Updated 3 years ago
- β198Mar 19, 2020Updated 6 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)β702Jul 27, 2020Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environmeβ¦β46Dec 20, 2020Updated 5 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.β255Jul 29, 2021Updated 4 years ago