paramint / AD-Attack-DefenseLinks
☆12Updated 2 years ago
Alternatives and similar repositories for AD-Attack-Defense
Users that are interested in AD-Attack-Defense are comparing it to the libraries listed below
Sorting:
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆37Updated last year
- ☆10Updated last year
- ☆13Updated 2 years ago
- ☆65Updated 2 years ago
- ☆92Updated last year
- Chista | Open Threat Intelligence Framework☆58Updated last year
- ☆28Updated 10 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.☆53Updated last year
- ☆12Updated 3 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 4 months ago
- ☆29Updated 4 years ago
- ☆40Updated 6 months ago
- ⚠️ Malware Development training ⚠️☆32Updated 4 months ago
- Challenge Python☆19Updated 2 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆22Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆74Updated 2 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 3 weeks ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆98Updated this week
- Hands-on projects for beginners to learn and practice Windows forensics and essential cybersecurity skills☆15Updated last year
- ☆75Updated 3 years ago
- Various PowerShell scripts that may be useful during red team exercise☆22Updated 3 years ago
- Automate Scoping, OSINT and Recon assessments.☆96Updated 5 months ago
- ☆24Updated 5 months ago
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆134Updated last month
- ☆34Updated 2 years ago
- A collection of red blue team staff☆46Updated 2 years ago
- This is an AD pentest tools collection☆59Updated last year
- Repository of cybersecurity mindmaps☆33Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago