A cheatsheet of tools and commands that I use to pentest Active Directory.
☆53Mar 26, 2022Updated 4 years ago
Alternatives and similar repositories for pentesting-active-directory
Users that are interested in pentesting-active-directory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A cheatsheet of commands used to pass the CARTP (Certified Azure Red Team Professional) exam.☆24May 4, 2023Updated 2 years ago
- Repo for malware development practices I post on my blog☆36Oct 5, 2024Updated last year
- ☆14Jul 29, 2024Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated 11 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Apr 17, 2024Updated last year
- This is an AD pentest tools collection☆59Jul 6, 2024Updated last year
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Repo for all my exploits/PoCs☆52May 6, 2025Updated 11 months ago
- ☆46Sep 20, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆13Oct 29, 2022Updated 3 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cheatsheets☆19Jul 4, 2022Updated 3 years ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 4 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- ☆35Nov 14, 2024Updated last year
- A list of all Active Directory machines from HackTheBox☆236Apr 5, 2026Updated last week
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆29Mar 16, 2024Updated 2 years ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆46Oct 29, 2023Updated 2 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- A Firefox Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆27Dec 9, 2024Updated last year
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- ☆692Mar 23, 2026Updated 3 weeks ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆620Apr 3, 2026Updated last week
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- A framework for identifying vulnerabilities in VS Code extensions☆19Jul 9, 2024Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- ☆31Mar 26, 2023Updated 3 years ago
- POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.☆35Jul 4, 2024Updated last year