Noob Penetration tester
☆11Jul 17, 2025Updated 9 months ago
Alternatives and similar repositories for Pentest-Active-Directory
Users that are interested in Pentest-Active-Directory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆29Mar 22, 2026Updated last month
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Oct 18, 2022Updated 3 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- ☆12Apr 14, 2021Updated 5 years ago
- Swagger Directory Enumeration (SDE)☆22Jan 16, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Threat Hunting queries of multiple platforms☆67Updated this week
- Claude Code skill that detects 40 AI writing patterns and rewrites text to sound human. Self-auditing loop. Bilingual (EN/ES).☆57Mar 22, 2026Updated last month
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Dec 2, 2020Updated 5 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated 2 years ago
- a collection of bash script and python to automate ZAP Security Tests☆11Oct 31, 2020Updated 5 years ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆13Jan 2, 2020Updated 6 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover☆57Dec 15, 2020Updated 5 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- A list of web application security☆15Dec 26, 2019Updated 6 years ago
- Literally spray blind xss payloads everywhere.☆26Feb 22, 2022Updated 4 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Breaking secure checksums in the scudo heap allocator☆14Apr 9, 2020Updated 6 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- A collection of famous recon public scripts, but in bash <3☆29Mar 2, 2021Updated 5 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- Shellcode异或加密工具☆12Mar 23, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Conti V3 source code updated☆11Jun 30, 2022Updated 3 years ago
- ☆11Jan 29, 2021Updated 5 years ago
- A set of tools and procedures for automating NSM and NIDS deployments in AWS☆15Oct 16, 2020Updated 5 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- PowerShell script that gathers data about logons and logoffs from Event Logs.☆12Aug 2, 2013Updated 12 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18May 23, 2023Updated 2 years ago
- ☆12Nov 22, 2024Updated last year
- A Linux enumeration script for Hack The Box☆191Nov 27, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Olger, authomated cybersecurity analyst , check infrastructures and deploy solutions☆14Feb 15, 2023Updated 3 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- Lockstitch is an incremental, stateful cryptographic primitive for symmetric-key cryptographic operations (e.g. hashing, encryption, mess…☆12Feb 5, 2026Updated 3 months ago
- ☆16Jul 14, 2020Updated 5 years ago
- CVE-2023-33381: OS command injection on MitraStar GPT-2741GNAC☆13Jun 1, 2023Updated 2 years ago
- Useful windows tools for Blue, Red & Purple teams☆11Mar 8, 2026Updated last month
- Colocando el dominio de correo electrónico de una empresa se obtiene información usando el DNS, NMAP y Shodan☆16Feb 25, 2020Updated 6 years ago