A Network Enumeration and Attack Toolset for Windows Active Directory Environments.
β249Jun 19, 2024Updated last year
Alternatives and similar repositories for ActiveReign
Users that are interested in ActiveReign are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- For all your network pentesting needsβ154Jun 26, 2024Updated last year
- Enumerate information from NTLM authentication enabled web endpoints πβ507Sep 23, 2025Updated 6 months ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and usβ¦β575Jun 19, 2024Updated last year
- β128May 22, 2023Updated 2 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.β442Apr 1, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Port of Invoke-Excel4DCOMβ104Oct 12, 2019Updated 6 years ago
- A curated list of awesome BloodhoundAD resourcesβ237Oct 13, 2022Updated 3 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operationsβ355Dec 1, 2020Updated 5 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environmentsβ317Dec 19, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.β783Jun 20, 2020Updated 5 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLLβsβ331Oct 20, 2019Updated 6 years ago
- ObscurityLabs RedTeam C# Toolkitβ122Sep 3, 2019Updated 6 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelistingβ825Nov 15, 2025Updated 4 months ago
- A C# tool to search through a running instance of Outlook for keywordsβ111Jan 14, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- β332Dec 8, 2022Updated 3 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testersβ810Aug 28, 2022Updated 3 years ago
- Abusing Exchange via EWSβ153Sep 14, 2020Updated 5 years ago
- Create a minidump of the LSASS process from memoryβ261Nov 2, 2022Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is uβ¦β605Mar 2, 2021Updated 5 years ago
- β128Jun 19, 2020Updated 5 years ago
- β350Feb 21, 2022Updated 4 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale vβ¦β449May 25, 2022Updated 3 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at sβ¦β541Sep 18, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.β400May 20, 2020Updated 5 years ago
- Detect and abuse risky SPNsβ268Jun 15, 2017Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application contβ¦β351Aug 27, 2018Updated 7 years ago
- gather gather gatherβ584Mar 15, 2025Updated last year
- My musings with C#β28Dec 23, 2022Updated 3 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.β249Sep 9, 2021Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundledβ145Mar 17, 2026Updated 3 weeks ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.β382Apr 28, 2020Updated 5 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash toβ¦β179Sep 11, 2023Updated 2 years ago
- NordVPN Threat Protection Proβ’ β’ AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- lateral movement techniques that can be used during red team exercisesβ277Jan 13, 2020Updated 6 years ago
- Extract credentials from lsass remotelyβ2,190Mar 23, 2026Updated 2 weeks ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Intβ¦β142Dec 8, 2022Updated 3 years ago
- β197Mar 19, 2020Updated 6 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)β702Jul 27, 2020Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environmeβ¦β46Dec 20, 2020Updated 5 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.β255Jul 29, 2021Updated 4 years ago