rodolfomarianocy / Tricks-Pentest-Active-DirectoryView external linksLinks
Repository with quick triggers to help during Pentest in an Active Directory environment.
☆47Jul 28, 2025Updated 6 months ago
Alternatives and similar repositories for Tricks-Pentest-Active-Directory
Users that are interested in Tricks-Pentest-Active-Directory are comparing it to the libraries listed below
Sorting:
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Web Application Penetration Testing☆146May 4, 2025Updated 9 months ago
- OSCP Cheatsheet☆16Jun 14, 2023Updated 2 years ago
- rust port of pspy with support for process monitoring over dbus☆35Jan 4, 2026Updated last month
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆51Feb 10, 2026Updated last week
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- Some Useful Tricks for Pentest Android and iOS Apps☆159Nov 10, 2025Updated 3 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆22Jan 30, 2026Updated 2 weeks ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆46Oct 26, 2025Updated 3 months ago
- ADDS (Active Directory Domain Services)☆28Feb 3, 2026Updated 2 weeks ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Colored Cat is a syntax highlighter file reader.☆15Jun 21, 2024Updated last year
- Misery Loader to bypass modern EDR solutions☆15Dec 20, 2024Updated last year
- My little precious collection of Linux 4.x kernel rootkits☆28Jul 27, 2024Updated last year
- Secretsdump C# version only supporting local (live) operation☆55Apr 20, 2025Updated 9 months ago
- ☆26Mar 11, 2025Updated 11 months ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆33Mar 5, 2025Updated 11 months ago
- Collection of red team techniques.☆66Apr 25, 2025Updated 9 months ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated last year
- HackTheBox: Certified Bug Bounty Hunter's Writeup by Hung Thinh Tran☆13May 27, 2023Updated 2 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Learning resources and external resources to help you prepare for your offsec certifications☆100Nov 1, 2024Updated last year
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- ☆16Mar 26, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆36Nov 16, 2023Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Jan 12, 2024Updated 2 years ago
- ☆37Oct 3, 2023Updated 2 years ago
- Active Directory Cheat Sheet☆145May 7, 2021Updated 4 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- My Gitbook CyberSec Notes☆20Oct 22, 2025Updated 3 months ago
- hackxpert labs☆18Jun 29, 2022Updated 3 years ago
- INE Training Notes☆56Apr 7, 2025Updated 10 months ago
- ☆168Feb 29, 2024Updated last year
- ☆47Jan 14, 2024Updated 2 years ago
- ☆22Dec 30, 2025Updated last month