A list of all Active Directory machines from HackTheBox
☆236Apr 5, 2026Updated last week
Alternatives and similar repositories for HackTheBox-AD-Machines
Users that are interested in HackTheBox-AD-Machines are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated last month
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 3 months ago
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆61Nov 24, 2025Updated 4 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆53Mar 26, 2022Updated 4 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- ☆52Mar 30, 2026Updated 2 weeks ago
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for…☆184Mar 2, 2026Updated last month
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆33Jan 22, 2026Updated 2 months ago
- List of some AD tools I frequently use☆57Nov 2, 2025Updated 5 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 2 months ago
- Webshell agent in aspx and php☆27Dec 11, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- Creation of multiple Malware tools consisting of evasion, enumeration and exploitation☆99Apr 7, 2026Updated last week
- A cheatsheet for NetExec☆201Jun 9, 2025Updated 10 months ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 8 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 5 months ago
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆43Jan 18, 2025Updated last year
- Automated IP-focused reconnaissance tool for penetration testing. Autorecon like☆40Mar 5, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ADE: automates Active Directory enumeration for labs (Hack The Box, Hack Smarter, TryHackMe, Proving Grounds) and exam prep (OSCP, CPTS).☆30Jan 19, 2026Updated 2 months ago
- Azure apim mini proxy☆56Feb 16, 2026Updated last month
- Purple-team telemetry & simulation toolkit.☆114Dec 16, 2025Updated 3 months ago
- PoC Exploit for the NTLM reflection SMB flaw.☆690Feb 18, 2026Updated last month
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆41Mar 3, 2026Updated last month
- The Azure Execution Tool☆154Feb 6, 2026Updated 2 months ago
- UAC Bypass using CMSTP in Rust☆36Dec 6, 2024Updated last year
- Collection of Notes and CheatSheets used for Red teaming Certs☆498Feb 13, 2023Updated 3 years ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆48Oct 3, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 6 months ago
- A BloodHound OpenGraph collector that models Windows local privilege escalation as interconnected attack paths.☆465Mar 17, 2026Updated 3 weeks ago
- poc for cve-2025-53772☆48Dec 10, 2025Updated 4 months ago
- Deploy a phishing infrastructure on the fly.☆78Dec 21, 2024Updated last year
- A stager and implant that executes remote Web Assembly☆64Feb 4, 2026Updated 2 months ago
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆51Jan 22, 2025Updated last year
- A collection of useful tools and scripts were developed and gathered throughout the Offensive Security's PEN-300 (OSEP) course.☆342Aug 9, 2025Updated 8 months ago