☆12Oct 2, 2022Updated 3 years ago
Alternatives and similar repositories for Active-Directory-Permission-Abuse
Users that are interested in Active-Directory-Permission-Abuse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Jan 15, 2016Updated 10 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆247Mar 19, 2024Updated 2 years ago
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 10 months ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- ☆20Dec 7, 2021Updated 4 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated 11 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Running nextcloud + traefik + bitwarden on localhost with docker☆10Mar 22, 2020Updated 6 years ago
- Backend for Nuclear Pond☆21Dec 7, 2023Updated 2 years ago
- ☆29Oct 18, 2022Updated 3 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Jan 6, 2021Updated 5 years ago
- A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau☆12Jun 28, 2021Updated 4 years ago
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Mar 31, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 3 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- 🗺 Convert nmap XML output to beautiful JSON☆16Mar 17, 2023Updated 3 years ago
- ☆42Apr 22, 2021Updated 4 years ago
- Nim Library for Offensive Security Development☆199Sep 4, 2023Updated 2 years ago
- ☆20Mar 4, 2025Updated last year
- bowing to the AI Overlords.☆31Dec 18, 2024Updated last year
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆30Dec 16, 2021Updated 4 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆56Oct 6, 2020Updated 5 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆87Mar 22, 2023Updated 3 years ago
- Text4Shell scanner for Burp Suite☆189Oct 27, 2022Updated 3 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- Notes about the YouTube playlist: Red Team Operations with Cobalt Strike (2019)☆20Feb 16, 2021Updated 5 years ago