noraj / ADAssault
Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.
☆12Updated this week
Alternatives and similar repositories for ADAssault:
Users that are interested in ADAssault are comparing it to the libraries listed below
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Tools used for Pentesting☆22Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆33Updated 3 weeks ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 11 months ago
- simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose☆16Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- ☆29Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- Field guide to gather low-hanging fruits☆13Updated last week
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆33Updated last month
- Enumeration & fingerprint tool☆24Updated last year
- ☆27Updated last year
- Internal Network Penetration Test Playbook☆19Updated 3 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆14Updated 6 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 9 months ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated last month
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆18Updated 2 years ago
- ☆24Updated 5 years ago
- ☆13Updated last week
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 11 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Passworld is a fully customizable wordlist generator☆14Updated 6 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 4 years ago
- Bash script for CTF automating basic enumeration☆45Updated 3 years ago