seriotonctf / AD-ToolsLinks
List of some AD tools I frequently use
☆46Updated 4 months ago
Alternatives and similar repositories for AD-Tools
Users that are interested in AD-Tools are comparing it to the libraries listed below
Sorting:
- ☆38Updated last week
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆95Updated last year
- ☆56Updated 6 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated 7 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆57Updated this week
- Lateral Movement☆125Updated last year
- ☆16Updated 5 months ago
- Active Directory Authentication Library☆73Updated 3 weeks ago
- Repo for all my exploits/PoCs☆50Updated 3 weeks ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆115Updated 2 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- A Moodle Scanner☆42Updated 6 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 11 months ago
- Inject RDPThief into memory with PowerShell.☆64Updated 4 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- ☆50Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆45Updated 2 years ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆96Updated last month
- Crackmapexec custom scripts used in my internal pentests.☆24Updated last year
- .NET deserialization hunter☆77Updated 10 months ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆111Updated 10 months ago
- ☆72Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- ☆35Updated 6 months ago
- ☆85Updated 4 months ago
- ☆133Updated 3 weeks ago
- Golden collection of weak passwords☆62Updated 5 months ago
- ☆84Updated 3 months ago
- Used to get NTLMv2 Hashes from SMB☆13Updated 7 months ago