General scripts that gather information out of Active Directory
☆17Jun 9, 2022Updated 3 years ago
Alternatives and similar repositories for MADs
Users that are interested in MADs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sets up all the layers needed to log in over ssh with ssh keys☆17Jul 29, 2025Updated 9 months ago
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Apr 1, 2026Updated last month
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- Powershell scripts to implement a Tier administration model in Active Directory☆31Sep 22, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆18Feb 14, 2019Updated 7 years ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆50May 1, 2026Updated last week
- ☆11Apr 22, 2026Updated 2 weeks ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- interesting analysis☆16May 14, 2018Updated 7 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A collection of packer templates for building guest VMs.☆10Aug 6, 2015Updated 10 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- details about DIAL protocol vulnerabilities☆30Nov 24, 2023Updated 2 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Jun 26, 2018Updated 7 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- top usernames from azure survey 2025☆16Apr 25, 2025Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆11Oct 15, 2024Updated last year
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Go(lang) IDS rule parser☆13Jun 10, 2019Updated 6 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- ☆57Aug 19, 2024Updated last year
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Jun 21, 2019Updated 6 years ago
- Golang Implementation of Hell's gate☆21May 31, 2023Updated 2 years ago
- ☆18Jun 24, 2021Updated 4 years ago
- Cobalt Strike random C2 Profile generator☆16Apr 3, 2026Updated last month
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A python exploit to automatically dump all the data stored by the auto-completion plugin of Ametys CMS to a local sqlite database file.