active-directory-exploitation
There are 27 repositories under active-directory-exploitation topic.
S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
klezVirus/CheeseTools
Self-developed tools for Lateral Movement/Code Execution
arth0sz/Practice-AD-CS-Domain-Escalation
Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the white paper Certified Pre-Owned.
Ashifcoder/exposelab
This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.
PentestPlaybook/ad-lab-scripts
AD Lab Setup Scripts
Abhinandan-Khurana/MY-CRTP-Notes
This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.
ethanolivertroy/PNPT
Notes in preparation for the PNPT (Practical Network Penetration Testing) Certification Exam
A1vinSmith/OSCP-PWK
https://alvinsmith.gitbook.io/progressive-oscp/
coj337/TheSprayer
TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locking out accounts.
G0urmetD/PJPT-Notes
Cheatsheet from the PJPT course of TCM security.
e1abrador/Crackmapexec-custom-modules
Crackmapexec custom scripts used in my internal pentests.
galoget/gpp-cpass-decrypt
GPP CPassword Decryption Tools
maxbirnbacher/ADPentesting101
Repo with Tools and Wiki for Active Directory Pentesting
k4sth4/Abusing-rights-in-a-Domain
Active Directory Privileges
Balzu/Security-Events-Explorer
A user-friendly and powerful tool to analyze Windows Security Events
Ayoub-2/Get-HashId
Hash Identifier in PowerShell
h1j4cky/adjelly
Active Directory enumeration and exploitation tool
MohamedIdrissSomrani/Unconstrained_Delegation
🔍 Check Active Directory accounts for delegation types, identify unconstrained and constrained settings, and export results for analysis.
Toowan0x1/crtp
my notes & methodology used
Zin0D/Active-Directory-Hacking
All my Notes and Scripts regarding hacking Active-Directory
0xKirito/ADUserGen
Script to generate usernames wordlist to help enumerate Active Directory users based on their names. Supports multiple naming formats.
A9u3ybaCyb3r/Ethical-Hacking-Lab
The Virtual-Network-Penetration-Testing-Lab is a controlled environment designed for practicing security skills, including network security and penetration testing. By utilizing virtualization technologies, users can build and configure a network of virtual machines equipped with firewalls to simulate real-world scenarios. Bu
hanzalaghayasabbasi/Active-Directory-Lab
This Active Directory lab allows for the practice and exploration of various security features and potential abuse scenarios.
MottaSec/Argus-AD
Argus-AD is a comprehensive Active Directory security assessment tool designed for SYSADMINs and IT Admins to identify misconfigurations, privilege escalation paths, lateral movement opportunities, and hybrid identity issues in their Active Directory environments.
mr-tomr/Unconstrained_Delegation
Unconstrained_Delegation is a PowerShell toolkit to assess Active Directory (AD) accounts for delegation settings.
vibebhavv/Vulnerable-AD-Lab
A Vulnerable Active Directory lab setup for penetration testing and educational purposes.