Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.
☆19Mar 26, 2026Updated 2 weeks ago
Alternatives and similar repositories for ADAssault
Users that are interested in ADAssault are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs.☆20Jun 23, 2024Updated last year
- Unicode Security Toolkit☆21Updated this week
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 4 months ago
- Simple terminal-based client for TLDR pages, written in Crystal. TLDR pages is a collection of simplified and community-driven man pages…☆23Apr 11, 2024Updated 2 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆55Apr 2, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Opengraph-Compatible JSON Generator for BloodHound☆27Mar 30, 2026Updated last week
- Map binary data into a beautiful chart☆15Updated this week
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated last year
- Most Responder's configuration power in your hand.☆54Jan 19, 2025Updated last year
- Centralized Active Directory Auditing Tool☆21Oct 28, 2022Updated 3 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆19Feb 13, 2022Updated 4 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆29Jul 21, 2025Updated 8 months ago
- Config files for my GitHub profile.☆18Mar 21, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- ☆13Nov 17, 2021Updated 4 years ago
- Workshop Materials from DEFCON 25 (7/27/2017)☆22Jul 31, 2017Updated 8 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- Write-Ups for TryHackMe☆24May 15, 2021Updated 4 years ago
- ☆13Jul 8, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- opsi config data daemon.☆13Updated this week
- Python library powering opsi☆20Mar 6, 2026Updated last month
- Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given pe…☆25Jul 18, 2023Updated 2 years ago
- Bruter is an OSINT tooling, an experiment to build a reconnaissance simple app to have fun 🕵️♂️☆58Sep 17, 2024Updated last year
- ☆16Jun 4, 2025Updated 10 months ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 7 years ago
- Repository of CVE found by OCD people☆84Jun 19, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- Files for the Wi-Fi duck workshop☆12Jan 26, 2020Updated 6 years ago
- Subdomain finder☆10Mar 13, 2025Updated last year
- ☆11Mar 2, 2023Updated 3 years ago
- ☆16Jun 21, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Jul 13, 2021Updated 4 years ago
- HuntersEye is designed for Bug Bounty Hunters, and Security Researchers to monitor new subdomains and certificates for specified domains.…☆21Dec 29, 2023Updated 2 years ago