This is an AD pentest tools collection
☆59Jul 6, 2024Updated last year
Alternatives and similar repositories for AD-Mastertools-collection
Users that are interested in AD-Mastertools-collection are comparing it to the libraries listed below
Sorting:
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Nov 1, 2024Updated last year
- ☆29May 16, 2023Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆106Dec 29, 2024Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated 11 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Mar 26, 2022Updated 3 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- A fast subdomain takeover tool☆85Nov 10, 2023Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- Tool for bypassing logins vulnerable against SQL injection☆46Apr 3, 2024Updated last year
- 🕵️ Email osint tool☆64Aug 23, 2023Updated 2 years ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆262Jul 6, 2025Updated 7 months ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Aug 4, 2025Updated 7 months ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- CSS injection requires an attacker to load a standalone CSS file to leak HTML tag attributes.☆21Apr 19, 2024Updated last year
- Active Directory Auditing and Enumeration☆517Dec 3, 2025Updated 3 months ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Feb 13, 2022Updated 4 years ago
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- ☆13Nov 17, 2021Updated 4 years ago
- abusing misconfiguration for AD with LAPS☆11Jan 25, 2024Updated 2 years ago
- CVE-2024-34102: Unauthenticated Magento XXE☆14Jan 12, 2025Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- ☆28Sep 9, 2024Updated last year
- Information Security Information From Web☆28Jul 31, 2025Updated 7 months ago
- ☆168Feb 29, 2024Updated 2 years ago
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- Web Penetration Testing Course Materials☆32May 13, 2024Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 8 months ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Automated tool for domains & Subdomains Gathering☆14Updated this week
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆14Jun 4, 2025Updated 9 months ago
- Binwalk in a Docker image☆10Jul 31, 2019Updated 6 years ago