thecybermafia / OffensiveActiveDirectory
A set of instructions, command and techniques that help during an Active Directory Assessment.
☆83Updated 4 years ago
Alternatives and similar repositories for OffensiveActiveDirectory
Users that are interested in OffensiveActiveDirectory are comparing it to the libraries listed below
Sorting:
- My Favorite Offensive Security Scripts☆71Updated 2 weeks ago
- ☆40Updated 2 years ago
- InfoSec Notes☆56Updated last year
- This repo will contain some basic pentest/RT commands.☆37Updated 2 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- Automate the build of a vulnerable AD environment.☆36Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆44Updated 2 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆96Updated 11 months ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆108Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆55Updated last year
- C# tool to discover low hanging fruits☆93Updated 2 years ago
- Azure Service Subdomain Enumeration☆60Updated 8 months ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 3 years ago
- A little cheatsheet for NetExec☆22Updated last year
- A collection of red blue team staff☆46Updated last year
- a map for the azure oriented pentests☆67Updated last year
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated 10 months ago
- ☆98Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- OSWE Preparation☆37Updated 5 years ago
- Tool for enumerating Active Directory environments☆46Updated last year
- Resources for AD penetration testing and security☆30Updated 3 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆75Updated 2 weeks ago
- Automated exploitation of MSSQL servers at scale☆108Updated last week
- PEN-300/OSEP Public resources for PEN-300 Training☆97Updated 3 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆128Updated last year
- AzureAD Pentest☆19Updated 3 years ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆23Updated 3 years ago