A cheatsheet of tools and commands that I use to pentest Active Directory.
☆52Mar 26, 2022Updated 3 years ago
Alternatives and similar repositories for pentesting-active-directory
Users that are interested in pentesting-active-directory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A cheatsheet of commands used to pass the CARTP (Certified Azure Red Team Professional) exam.☆22May 4, 2023Updated 2 years ago
- Repo for malware development practices I post on my blog☆36Oct 5, 2024Updated last year
- ☆14Jul 29, 2024Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated 11 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Apr 17, 2024Updated last year
- This is an AD pentest tools collection☆59Jul 6, 2024Updated last year
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Repo for all my exploits/PoCs☆52May 6, 2025Updated 10 months ago
- This repository is for tools, guides, cheatsheets, and anything else related to learning all different aspects of security.☆95Sep 4, 2022Updated 3 years ago
- ☆47Sep 20, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆13Oct 29, 2022Updated 3 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Cheatsheets☆19Jul 4, 2022Updated 3 years ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- A list of all Active Directory machines from HackTheBox☆221Mar 2, 2026Updated 3 weeks ago
- ☆35Nov 14, 2024Updated last year
- ☆13Dec 21, 2023Updated 2 years ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆29Mar 16, 2024Updated 2 years ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆46Oct 29, 2023Updated 2 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- A Firefox Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆27Dec 9, 2024Updated last year
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- ☆688Updated this week
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆616Jul 31, 2025Updated 7 months ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- A framework for identifying vulnerabilities in VS Code extensions☆19Jul 9, 2024Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- ☆31Mar 26, 2023Updated 2 years ago