General scripts that gather information out of Active Directory
☆17Jun 9, 2022Updated 3 years ago
Alternatives and similar repositories for MADs
Users that are interested in MADs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sets up all the layers needed to log in over ssh with ssh keys☆17Jul 29, 2025Updated 8 months ago
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- Windows Security Descriptor Definition Language (SDDL) parser and formatter☆20Jun 8, 2020Updated 5 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Apr 1, 2026Updated 2 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Powershell scripts to implement a Tier administration model in Active Directory☆31Sep 22, 2020Updated 5 years ago
- Hashcat Bash Scripts for bulk hash file processing☆51Jul 2, 2016Updated 9 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Apr 1, 2026Updated 2 weeks ago
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆39Oct 9, 2021Updated 4 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆48Apr 10, 2026Updated last week
- ☆10Apr 8, 2026Updated last week
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆21May 27, 2025Updated 10 months ago
- interesting analysis☆16May 14, 2018Updated 7 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A collection of packer templates for building guest VMs.☆10Aug 6, 2015Updated 10 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Packer.io Scripts to build the SIFT VM(s)☆11Aug 29, 2020Updated 5 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- ☆12Aug 5, 2023Updated 2 years ago
- top usernames from azure survey 2025☆16Apr 25, 2025Updated 11 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Zen and the art of multi-cloud maintenance (Terraform, Consul, Vault and Nomad) - Lev Andelman & Andrei Burd☆13May 20, 2020Updated 5 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated last year
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- ☆11Oct 15, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Jun 21, 2019Updated 6 years ago
- Cobalt Strike random C2 Profile generator☆16Apr 3, 2026Updated 2 weeks ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- A python exploit to automatically dump all the data stored by the auto-completion plugin of Ametys CMS to a local sqlite database file.☆14May 3, 2022Updated 3 years ago