ActiveDirectoryAttackTool
arsenal
ActiveDirectoryAttackTool | arsenal | |
---|---|---|
2 | 9 | |
90 | 2,985 | |
- | 1.4% | |
0.0 | 7.3 | |
about 1 year ago | 7 days ago | |
Shell | Python | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ActiveDirectoryAttackTool
-
A tool to help with Active Directory and Windows
ADAT: https://github.com/The-Viper-One/ActiveDirectoryAttackTool
- Where can I find the best AD notes / cheatsheet for every situation :) ?
arsenal
- HackersToolKit.co - One-Stop Shop for Tool Commands for CTFs, bug bounty, and Penetration Testing
- The road to round 2 (so far)
-
Where can I find the best AD notes / cheatsheet for every situation :) ?
That AD Enum mindmap is here. I haven't tried adPEAS yet. But this was recommended many many times. Check. (:
- Orange-Cyberdefense/arsenal: inventory and launcher for hacking programs
- Arsenal
- GitHub - Orange-Cyberdefense/arsenal: Arsenal is just a quick inventory and launcher for hacking programs
-
Reconmap 1.5.0 release notes
900s new commands were imported from the awesome https://github.com/Orange-Cyberdefense/arsenal project into Reconmap. This pushed us to add pagination, better search, sorting and so on to the command pages as it was otherwise impossible to find the right security command amongst the long list.
-
Just failed the new format. General thoughts.
I'm really interested in feedback of those that tried "everything" to laterally move in the domain sets but failed. Have you tried everything from this mindmap for example? Much of that is out of scope on OSCP but will help you learn more about the mindset of moving in a domain.
- Pentesting AD Mindmap
What are some alternatives?
adPEAS - Powershell tool to automate Active Directory enumeration.
reconmap - Vulnerability assessment and penetration testing automation and reporting platform for teams.
linux-smart-enumeration - Linux enumeration tool for pentesting and CTFs with verbosity levels
RedTeaming_CheatSheet - Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.
t14m4t - Automated brute-forcing attack tool.
packages
Garud - An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically.
kashz-jewels - Gitbook: kashz-Jewels
webrecon - Automated Web Recon Shell Scripts
AppleGamer22 - My write-ups (with references/bibliography to 3rd parties)