AD concepts, attack surfaces and attack vectors notes, slides, video...
☆16Dec 6, 2024Updated last year
Alternatives and similar repositories for Active-Directory-For-Hackers
Users that are interested in Active-Directory-For-Hackers are comparing it to the libraries listed below
Sorting:
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆30Apr 29, 2025Updated 10 months ago
- Projects For The Finite Element Method Lesson And The Exercise Answers.☆10Dec 15, 2024Updated last year
- CTF Writeups☆28Aug 15, 2024Updated last year
- 安全好文整理,松鼠症患者福音☆13Nov 30, 2023Updated 2 years ago
- Hand Tracker Project by Python and Arduino Board☆12Dec 15, 2024Updated last year
- نمونه سوالات و پاسخ های مصاحبه تیم قرمز☆18Aug 29, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆41Oct 18, 2022Updated 3 years ago
- ☆20Sep 2, 2024Updated last year
- dEX is a powerful tool for transmitting OS command output over DNS. It is equipped with robust mechanisms for handling missing chunks, en…☆18Nov 21, 2024Updated last year
- Reconnaissance & Footprinting framework for BugHunters & RedTeamers☆21Aug 15, 2025Updated 6 months ago
- Detect SSRF within Caido☆48Feb 20, 2026Updated last week
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- ☆18Oct 1, 2025Updated 5 months ago
- ☆37Jan 4, 2026Updated 2 months ago
- Codes for malware, viruses and key-logger and other tools☆37Aug 14, 2021Updated 4 years ago
- This repository aims to provide a comprehensive and structured approach to the reconnaissance (recon) phase of bug bounty hunting. The re…☆40Mar 22, 2025Updated 11 months ago
- A tool to find and save recent writeups from specified URLs, with optional Telegram notifications.☆10Dec 24, 2025Updated 2 months ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆51May 5, 2025Updated 10 months ago
- سوالات و پاسخ های مصاحبه تست نفوذ وب☆41Nov 3, 2025Updated 4 months ago
- Zero-Day Code Injection and Persistence Technique☆35Mar 28, 2017Updated 8 years ago
- Snake and ladders game☆11Mar 3, 2023Updated 3 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- ☆14May 14, 2022Updated 3 years ago
- Mooder是一款开源、安全、简洁、强大的团队内部知识分享平台。☆15Jul 3, 2025Updated 8 months ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- ☆42Jul 13, 2024Updated last year
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆100Sep 9, 2024Updated last year
- A repository showcasing Computer Engineering courses at Shahid Chamran University of Ahvaz, featuring organized information related to ea…☆11Apr 11, 2025Updated 10 months ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆10Jun 22, 2021Updated 4 years ago
- ☆47Apr 18, 2023Updated 2 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- ☆12Aug 25, 2023Updated 2 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- ☆16Aug 25, 2025Updated 6 months ago
- نمونه سوالات و پاسخ های مصاحبه تست نفوذ برنامه های موبایل☆15Aug 21, 2023Updated 2 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- Uma lista de recursos para quem deseja aprender sobre Physical Pentesting☆12Jul 28, 2025Updated 7 months ago