Windows Active DIrectory Pentesting documentation.
☆20Jun 14, 2024Updated last year
Alternatives and similar repositories for adPentest
Users that are interested in adPentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool that bypasses Windows Defender by manually loading DLLs, parsing EAT directly, and updating IAT with unhooked functions to run M…☆21Jul 14, 2024Updated last year
- Easily search LLVM headers for all major versions!☆19Sep 14, 2025Updated 7 months ago
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆12May 27, 2023Updated 2 years ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- go client for the wazuh rest api☆13Apr 22, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- sl0ppy-PrivescTaskCreator.ps1☆41Oct 8, 2025Updated 6 months ago
- Sum the time-tracking "/spend" commands of commit messages.☆15Apr 6, 2024Updated 2 years ago
- Powerful Rat/Botnet written C/C++ and Rust works on Windows, Linux and Mac OS, Android and IOT Devices Central / P2P Architecture. (Proje…☆12Apr 8, 2026Updated 3 weeks ago
- ☆59Feb 19, 2026Updated 2 months ago
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆120Oct 9, 2025Updated 6 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Sigma to Wazuh rule converter☆23Apr 28, 2026Updated last week
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- The Binary Code Recognition Library for game hacking/modding and function reidentification for linux☆14Jan 25, 2026Updated 3 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 8 months ago
- Source data & analysis of NSA SECONDDATE packet-injection framework☆11Apr 9, 2017Updated 9 years ago
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 11 months ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- This is a coredns plugin to return NXDOMAIN response for any domain on preloaded lists. It can be useful to block malware domains or trac…☆55Updated this week
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- example template for creating new subsystem roles☆15Apr 27, 2026Updated last week
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 3 years ago
- ☆27Mar 6, 2025Updated last year
- All my POC related to malware development☆15Feb 19, 2026Updated 2 months ago
- wazuh-helm-chart☆80Updated this week
- AIDA64DRIVER Elevation of Privilege Vulnerability☆17Oct 25, 2024Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆104Apr 9, 2026Updated 3 weeks ago
- This project will guide yout to awareness of injection in almost every window API and process.☆25Mar 30, 2022Updated 4 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆16Aug 25, 2025Updated 8 months ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Obtenir un observateur☆12Dec 14, 2025Updated 4 months ago
- ☆18Jan 9, 2025Updated last year
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- A universal binary patching dll.☆119Oct 9, 2024Updated last year
- Exploring different process injection techniques based on malware analysis☆14Dec 28, 2023Updated 2 years ago