Attack and defend active directory using modern post exploitation adversary tradecraft activity
☆14Jan 24, 2021Updated 5 years ago
Alternatives and similar repositories for AD-Attack-Defense
Users that are interested in AD-Attack-Defense are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Apr 26, 2019Updated 6 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆36Dec 18, 2016Updated 9 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- A cross-platform python based utility to identify wordpress plugins used by a website.☆22Feb 2, 2021Updated 5 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Hide your tcp connection!!!☆12Apr 8, 2020Updated 5 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆12Dec 5, 2017Updated 8 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- A tool to uncover hidden SSIDs☆13Apr 17, 2019Updated 6 years ago
- Process hide tool based on Frost driver☆15Dec 5, 2018Updated 7 years ago
- Malice Bitdefender AntiVirus Plugin☆14Mar 22, 2020Updated 6 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 3 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Zero downtime restart and graceful shutdown in one line of code☆11Jul 24, 2020Updated 5 years ago
- Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian☆57Dec 13, 2021Updated 4 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,252Mar 9, 2020Updated 6 years ago
- A little python script to uncovering hidden SSIDs.☆11Oct 29, 2017Updated 8 years ago
- Standalone, local-runnable binaries of popular linux distributions☆10Dec 15, 2021Updated 4 years ago
- USB Flashing Format (UF2) JavaScript Library☆13Jan 21, 2023Updated 3 years ago
- ☆13Mar 20, 2021Updated 5 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Using a MITM proxy to add a browser-based keylogger to devices on your local network☆14Jul 10, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆15Nov 20, 2017Updated 8 years ago
- Packages using the X Window System.☆12Feb 9, 2019Updated 7 years ago
- OpenRAN Gym website☆12Dec 11, 2025Updated 3 months ago
- Lightweight Linux for Docker☆11Nov 20, 2018Updated 7 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- Read Magnetic stripe data using square card reader☆13Jul 12, 2013Updated 12 years ago
- This app generate various combinations with 2048 keywords. Creates wallet addresses with generated words. Queries the created wallets on …☆14Jul 5, 2022Updated 3 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- Docker environment for hackers☆17Jun 20, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Termux - a terminal emulator application for Android OS extendible by variety of packages.☆11Jan 8, 2023Updated 3 years ago
- Online test is available 👉☆12Mar 17, 2026Updated last week
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 2 years ago
- EvilDroid+TheFatRat☆15Oct 18, 2018Updated 7 years ago
- Integrate proxyrack.com API service using multiple languages☆15Sep 30, 2022Updated 3 years ago
- A simple webhook server☆12May 25, 2021Updated 4 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago