soheilsec / Active-Directory-For-Hackers
AD concepts, attack surfaces and attack vectors notes, slides, video...
☆13Updated 3 months ago
Alternatives and similar repositories for Active-Directory-For-Hackers:
Users that are interested in Active-Directory-For-Hackers are comparing it to the libraries listed below
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆27Updated 3 months ago
- Reconnaissance & Footprinting framework for BugHunters & RedTeamers☆20Updated 3 weeks ago
- Simple django rce exploitation with leaked SECRET_KEY variable☆51Updated 2 years ago
- This is a useful Python script for extracting bug bounty or any other write-ups from every RSS.☆129Updated 3 months ago
- One proxy to rule them all☆118Updated 8 months ago
- A vulnerable RESTful application written in Node and React based on OWASP API security top 10 2023 edition.☆51Updated last year
- CorsOne - CORS Misconfiguration Discovery Tool☆20Updated last month
- A powerful JavaScript monitoring tool for bug bounty hunters. Track changes in JavaScript files across websites, detect new attack surfac…☆69Updated 3 weeks ago
- Here we are gather all Nuclei Templates that are Publically available.☆13Updated 11 months ago
- This is a useful Python script for generating a target specific wordlist for fuzzing backup files.☆31Updated last year
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆42Updated 3 months ago
- Get some useful data from Clouds for your targets☆20Updated this week
- dEX is a powerful tool for transmitting OS command output over DNS. It is equipped with robust mechanisms for handling missing chunks, en…☆14Updated 4 months ago
- Extractify extension is a Chrome extension designed for web security testing, enabling users to efficiently extract JavaScript files and …☆27Updated 3 months ago
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆21Updated last week
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 6 months ago
- This extension enhances Burp Suite by adding several UI and functional features, making it more user-friendly.☆67Updated 3 months ago
- A tool for extract Endpoints, URLs and Secrets from contents☆59Updated last month
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆55Updated last month
- 😁 Easy Regex☆28Updated last year
- 🕵️♂️🔍 A tool with several scanning techniques that extracts live IP addresses from a list of IP addresses or CIDR notations.☆52Updated last year
- ReconMaster contest - scripts used and a write-up☆87Updated 3 years ago
- Red Team Roadmap [defination, job positions, skills, tools]☆56Updated last year
- Weaponize Your Burp is a repository for automation your Bug Bounty Hunting mindset in Burp Suite☆77Updated 2 years ago
- A comprehensive collection of various techniques and methods for bypassing Two-Factor Authentication (2FA) security mechanisms.☆42Updated 3 months ago
- Raven is a powerful and customizable web crawler written in Go.☆41Updated 7 months ago
- go script for check some medium user and tags then add to database and send it to discord server.☆20Updated 2 years ago
- Smart Setup Server For BugBounty☆26Updated last year
- FavHash is a script that converts url to favhash to use it in search engines.☆16Updated 2 years ago
- Wordlists for content discovery with special words in different languages☆13Updated 2 months ago