Attack and defend active directory using modern post exploitation adversary tradecraft activity
☆13Jan 24, 2021Updated 5 years ago
Alternatives and similar repositories for AD-Attack-Defense
Users that are interested in AD-Attack-Defense are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Apr 26, 2019Updated 7 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆38Dec 18, 2016Updated 9 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Collection My Wordlist☆122Feb 4, 2017Updated 9 years ago
- A curated list of amazingly libraries, services and resources to work with PDF files☆17Apr 13, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 6 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Hide your tcp connection!!!☆12Apr 8, 2020Updated 6 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆12Dec 5, 2017Updated 8 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- A tool to uncover hidden SSIDs☆13Apr 17, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Process hide tool based on Frost driver☆16Dec 5, 2018Updated 7 years ago
- 📁 Easily share your files directly from the terminal.☆12Mar 10, 2022Updated 4 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 4 years ago
- Crack Everything for CrackMapExec version 6☆22Jul 1, 2024Updated last year
- ☆11May 30, 2021Updated 4 years ago
- A little python script to uncovering hidden SSIDs.☆11Oct 29, 2017Updated 8 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,257Mar 9, 2020Updated 6 years ago
- Zero downtime restart and graceful shutdown in one line of code☆11Jul 24, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 11 years ago
- ☆15Nov 20, 2017Updated 8 years ago
- Packages using the X Window System.☆12Feb 9, 2019Updated 7 years ago
- A guide explaining how to use Gophish☆42Sep 6, 2022Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- Read Magnetic stripe data using square card reader☆13Jul 12, 2013Updated 12 years ago
- Lightweight Linux for Docker☆11Nov 20, 2018Updated 7 years ago
- Distributed WPA/WPA2 cracker☆16Mar 23, 2015Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Solve Letterpress boards with Node.js.☆24Jan 23, 2017Updated 9 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- Termux - a terminal emulator application for Android OS extendible by variety of packages.☆12Jan 8, 2023Updated 3 years ago
- phishing lock html php template☆16Apr 22, 2023Updated 3 years ago
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 2 years ago
- EvilDroid+TheFatRat☆15Oct 18, 2018Updated 7 years ago
- 802.11 frame injection/reception tool for Linux mac80211 stack☆20Dec 30, 2014Updated 11 years ago