sabrinalupsan / pentesting-active-directoryLinks
A cheatsheet of tools and commands that I use to pentest Active Directory.
☆50Updated 3 years ago
Alternatives and similar repositories for pentesting-active-directory
Users that are interested in pentesting-active-directory are comparing it to the libraries listed below
Sorting:
- Powershell tools used for Red Team / Pentesting.☆78Updated last year
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆98Updated 3 weeks ago
- ☆92Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated last week
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆28Updated last year
- A list of all Active Directory machines from HackTheBox☆62Updated last week
- This is an AD pentest tools collection☆59Updated last year
- Learning resources and external resources to help you prepare for your offsec certifications☆85Updated 9 months ago
- ☆25Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 6 months ago
- ☆94Updated 4 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 6 months ago
- Red Teaming tools and techniques☆54Updated 2 years ago
- This repository serves as a curated resource for OffSec's OSEP (PEN-300) certification preparation, containing useful links, materials, a…☆65Updated 8 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆141Updated last year
- ☆86Updated 5 months ago
- A compilation of important commands, files, and tools used in Pentesting☆52Updated 2 years ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆39Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- LDAP Enumeration Tool for Pentesters☆48Updated 3 months ago
- Vulnerabilities you my miss during a penetration testing.☆99Updated last year
- Everything and anything related to password spraying☆142Updated last year
- Script related in Active Directory Attacks Domain☆22Updated last year
- ☆65Updated 2 years ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆82Updated 9 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆109Updated 2 months ago
- ☆40Updated 7 months ago
- ☆117Updated last month
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆33Updated 3 months ago