| samratashok/nishang |
7,771 |
|
0 |
0 |
over 2 years ago |
0 |
|
21 |
other |
PowerShell |
| Nishang - Offensive PowerShell for red team, penetration testing and offensive security. |
| S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet |
4,672 |
|
0 |
0 |
over 2 years ago |
0 |
|
4 |
mit |
|
| A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. |
| JPCERTCC/LogonTracer |
2,556 |
|
0 |
0 |
about 2 years ago |
0 |
|
17 |
other |
Python |
| Investigate malicious Windows logon by visualizing and analyzing Windows event log |
| vletoux/pingcastle |
1,969 |
|
0 |
0 |
about 2 years ago |
0 |
|
30 |
other |
C# |
| PingCastle - Get Active Directory Security at 80% in 20% of the time |
| Pennyw0rth/NetExec |
1,596 |
|
0 |
0 |
about 2 years ago |
0 |
|
25 |
bsd-2-clause |
Python |
| The Network Execution Tool |
| byt3bl33d3r/DeathStar |
1,545 |
|
0 |
0 |
about 2 years ago |
1 |
December 17, 2020 |
14 |
gpl-3.0 |
Python |
| Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs. |
| Qianlitp/WatchAD |
1,248 |
|
0 |
0 |
about 3 years ago |
0 |
|
26 |
gpl-3.0 |
Python |
| AD Security Intrusion Detection System |
| PlumHound/PlumHound |
958 |
|
0 |
0 |
about 2 years ago |
0 |
|
7 |
gpl-3.0 |
Python |
| Bloodhound for Blue and Purple Teams |
| Integration-IT/Active-Directory-Exploitation-Cheat-Sheet |
659 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
mit |
PowerShell |
| A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. |
| GoFetchAD/GoFetch |
507 |
|
0 |
0 |
almost 9 years ago |
0 |
|
2 |
other |
PowerShell |
| GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application. |