A swiss army knife for pentesting networks
-
Updated
Jul 3, 2023 - Python
A swiss army knife for pentesting networks
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Investigate malicious Windows logon by visualizing and analyzing Windows event log
PowerShell functions and scripts (Azure, Active Directory, SCCM, SCSM, Exchange, O365, ...)
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
PingCastle - Get Active Directory Security at 80% in 20% of the time
AutomatedLab is a provisioning solution and framework that lets you deploy complex labs on HyperV and Azure with simple PowerShell scripts. It supports all Windows operating systems from 2008 R2 to 2022, some Linux distributions and various products like AD, Exchange, PKI, IIS, etc.
Bonobo Git Server for Windows is a web application you can install on your IIS and easily manage and connect to your git repositories. Go to homepage for release and more info.
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
Directory Services Internals (DSInternals) PowerShell Module and Framework
linWinPwn is a bash script that automates a number of Active Directory Enumeration and Vulnerability checks
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
AD Security Intrusion Detection System
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
RedSnarf is a pen-testing / red-teaming tool for Windows environments
Red Team Cheatsheet in constant expansion.
Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
Bloodhound for Blue and Purple Teams
Add a description, image, and links to the active-directory topic page so that developers can more easily learn about it.
To associate your repository with the active-directory topic, visit your repo's landing page and select "manage topics."