Workshop Materials from DEFCON 25 (7/27/2017)
☆22Jul 31, 2017Updated 8 years ago
Alternatives and similar repositories for DEFCON25_Attack_Defend_ActiveDirectory_Workshop
Users that are interested in DEFCON25_Attack_Defend_ActiveDirectory_Workshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- Public version of dopescope code☆14Jan 31, 2017Updated 9 years ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆11Oct 18, 2019Updated 6 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 7 months ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆31Nov 6, 2019Updated 6 years ago
- Vulnerabilities, exploits, and PoCs☆37Mar 17, 2026Updated last week
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆22Sep 7, 2017Updated 8 years ago
- Windows Event Forwarding for Active Directory Security Logs☆29Jun 28, 2016Updated 9 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆66Sep 9, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A Burp Suite Extender that recognize CAPTCHA and use for intruder payload☆18Dec 28, 2017Updated 8 years ago
- Command-line option parser.☆46Sep 11, 2016Updated 9 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- LDAP Querying without the Suck☆111Nov 9, 2024Updated last year
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- Cisco RV110w UPnP stack overflow☆28Sep 30, 2021Updated 4 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆305Sep 7, 2022Updated 3 years ago
- Scan usom blocked url list inside your ip masks.☆21Feb 21, 2018Updated 8 years ago
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆36Feb 13, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- It decompiles target apk and adds security exception to accept all certificates thus making able to work with Burp/Charles and Other Tool…☆18Nov 22, 2020Updated 5 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 11 years ago
- Write great documents with markdown, then execute in the shell.☆10Sep 1, 2017Updated 8 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- Windows Scripts☆12Apr 2, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Some simple scripts for decrypting passwords retrieved from a Manage Engine OpManager installation☆11Jan 28, 2016Updated 10 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- Process Hollowing Packer☆29Sep 5, 2017Updated 8 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago