surajpkhetani / Active-Directory-Permission-AbuseView external linksLinks
☆12Oct 2, 2022Updated 3 years ago
Alternatives and similar repositories for Active-Directory-Permission-Abuse
Users that are interested in Active-Directory-Permission-Abuse are comparing it to the libraries listed below
Sorting:
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Find your hash in online databases and retrieve its original value☆17Sep 22, 2023Updated 2 years ago
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Jan 15, 2016Updated 10 years ago
- 🗺 Convert nmap XML output to beautiful JSON☆16Mar 17, 2023Updated 2 years ago
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 2 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau☆13Jun 28, 2021Updated 4 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 9 months ago
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Mar 31, 2021Updated 4 years ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- ☆20Mar 4, 2025Updated 11 months ago
- Notes about the YouTube playlist: Red Team Operations with Cobalt Strike (2019)☆20Feb 16, 2021Updated 5 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- Backend for Nuclear Pond☆21Dec 7, 2023Updated 2 years ago
- ☆20Dec 7, 2021Updated 4 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- A simple utility to generate domain names with all possible TLDs☆23Feb 3, 2023Updated 3 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆56Oct 6, 2020Updated 5 years ago
- ☆102Oct 5, 2020Updated 5 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated 10 months ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- Related subdomains finder☆28May 18, 2022Updated 3 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆32Nov 12, 2025Updated 3 months ago
- Go package for resolving IP addresses back to published cloud provider public ranges☆27May 8, 2018Updated 7 years ago
- ☆72Aug 2, 2022Updated 3 years ago
- Mass querying whois records☆29Dec 28, 2021Updated 4 years ago
- A set of helper scripts, to be used with jlib to help parsing domains.☆27Oct 21, 2020Updated 5 years ago
- A .git/ folder disclosure exploit☆22Jul 14, 2019Updated 6 years ago
- ☆29Oct 18, 2022Updated 3 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆36Nov 12, 2025Updated 3 months ago
- bowing to the AI Overlords.☆30Dec 18, 2024Updated last year
- Tool to extract & validate google fcm server keys from apks☆30Jan 20, 2021Updated 5 years ago