Workshop Materials from DEFCON 25 (7/27/2017)
☆22Jul 31, 2017Updated 8 years ago
Alternatives and similar repositories for DEFCON25_Attack_Defend_ActiveDirectory_Workshop
Users that are interested in DEFCON25_Attack_Defend_ActiveDirectory_Workshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- ☆11Oct 18, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆14Sep 22, 2019Updated 6 years ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 8 months ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆31Nov 6, 2019Updated 6 years ago
- Vulnerabilities, exploits, and PoCs☆37Mar 30, 2026Updated 2 weeks ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆22Sep 7, 2017Updated 8 years ago
- Windows Event Forwarding for Active Directory Security Logs☆29Jun 28, 2016Updated 9 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆66Sep 9, 2021Updated 4 years ago
- Command-line option parser.☆46Sep 11, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- Cisco RV110w UPnP stack overflow☆28Sep 30, 2021Updated 4 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆305Sep 7, 2022Updated 3 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Scan usom blocked url list inside your ip masks.☆21Feb 21, 2018Updated 8 years ago
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆36Feb 13, 2024Updated 2 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- It decompiles target apk and adds security exception to accept all certificates thus making able to work with Burp/Charles and Other Tool…☆18Nov 22, 2020Updated 5 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Write great documents with markdown, then execute in the shell.☆10Sep 1, 2017Updated 8 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- Some simple scripts for decrypting passwords retrieved from a Manage Engine OpManager installation☆11Jan 28, 2016Updated 10 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- Process Hollowing Packer☆29Sep 5, 2017Updated 8 years ago
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- Django-docopt-command allows you to write Django manage.py commands using the docopt library☆26May 21, 2024Updated last year
- Repository for LasLabs Active Directory Tools & Scripts☆11Sep 5, 2017Updated 8 years ago
- Quadruped Robot Dogs + ROS & Gelblasters == Dystopian Future "Fox" Hunt☆11Sep 28, 2023Updated 2 years ago
- Active Directory/Samba web interface☆13Apr 16, 2017Updated 9 years ago
- Validates username & password combination(s) across a host or group of hosts using the SMB protocol.☆15Apr 6, 2020Updated 6 years ago