paramint / AD-Attack-DefenseLinks
☆13Updated 2 years ago
Alternatives and similar repositories for AD-Attack-Defense
Users that are interested in AD-Attack-Defense are comparing it to the libraries listed below
Sorting:
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆38Updated last year
- ☆10Updated last year
- ☆65Updated 2 years ago
- ☆13Updated 2 years ago
- ☆24Updated 10 months ago
- ☆28Updated last year
- ☆15Updated 3 years ago
- ☆91Updated 2 years ago
- Chista | Open Threat Intelligence Framework☆61Updated last year
- ☆29Updated 4 years ago
- This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.☆54Updated 3 months ago
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago
- A collection of red blue team staff☆47Updated 2 years ago
- ☆23Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆42Updated last month
- A curated list wordlists for bruteforcing and fuzzing☆85Updated 2 years ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆100Updated 5 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆13Updated 3 months ago
- Web Hacking and Red Teaming MindMap☆78Updated last month
- ☆76Updated 4 years ago
- Challenge Python☆19Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆53Updated 3 years ago
- Various PowerShell scripts that may be useful during red team exercise☆21Updated 3 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- Red Team Guides☆143Updated last year
- This Repository Talks about the Follina MSDT from Defender Perspective☆38Updated 3 years ago
- This is an AD pentest tools collection☆59Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆98Updated last month