Windows Active DIrectory Pentesting documentation.
☆19Jun 14, 2024Updated last year
Alternatives and similar repositories for adPentest
Users that are interested in adPentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool that bypasses Windows Defender by manually loading DLLs, parsing EAT directly, and updating IAT with unhooked functions to run M…☆21Jul 14, 2024Updated last year
- Easily search LLVM headers for all major versions!☆19Sep 14, 2025Updated 6 months ago
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆13May 27, 2023Updated 2 years ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- go client for the wazuh rest api☆12Nov 1, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- sl0ppy-PrivescTaskCreator.ps1☆40Oct 8, 2025Updated 5 months ago
- Sigma to Wazuh rule converter☆18Sep 28, 2025Updated 5 months ago
- Sum the time-tracking "/spend" commands of commit messages.☆15Apr 6, 2024Updated last year
- ☆59Feb 19, 2026Updated last month
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆119Oct 9, 2025Updated 5 months ago
- C library that is intended for providing methods for executing and injecting code.☆17Aug 14, 2024Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- The Binary Code Recognition Library for game hacking/modding and function reidentification for linux☆13Jan 25, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 6 months ago
- Source data & analysis of NSA SECONDDATE packet-injection framework☆11Apr 9, 2017Updated 8 years ago
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- This is a coredns plugin to return NXDOMAIN response for any domain on preloaded lists. It can be useful to block malware domains or trac…☆56Mar 9, 2026Updated 2 weeks ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- example template for creating new subsystem roles☆15Mar 14, 2026Updated last week
- tp5 thinkphp5.x综合利用工具☆19Dec 11, 2022Updated 3 years ago
- ☆27Mar 6, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- Unreal Engine 5 Shooter made in C++☆16Jul 4, 2023Updated 2 years ago
- wazuh-helm-chart☆73Mar 5, 2026Updated 2 weeks ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆101Jan 3, 2026Updated 2 months ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆16Aug 25, 2025Updated 7 months ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- ☆18Jan 9, 2025Updated last year
- A Third Person Shooter like PubG or Call Of Duty and along with Shooter NPC AI which controlled by statemachine.☆27Jun 30, 2024Updated last year
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago