MicrosoftWontFixList
pentesting-active-directory
MicrosoftWontFixList | pentesting-active-directory | |
---|---|---|
6 | 2 | |
931 | 263 | |
- | - | |
0.0 | 1.6 | |
almost 3 years ago | 12 months ago | |
BSD 3-clause "New" or "Revised" License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
MicrosoftWontFixList
- How is Hamachi dangerous?
- GitHub - cfalta/MicrosoftWontFixList: A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021 (and SpoolSample ;-))
- MicrosoftWontFixList/README.md at main ยท cfalta/MicrosoftWontFixList
- AD vulnerability fatigue
- Microsoft's wont-fix list
- Microsoft Wont-Fix-List
pentesting-active-directory
-
AD privEsc
It's public, https://github.com/esidate/pentesting-active-directory
-
Active Directory Pentesting mind map by Orange Cyberdefense
An Active Directory Pentesting mind map that was deleted by the original author from Xmind
What are some alternatives?
the_cyber_plumbers_handbook - Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
Villain - Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
GoodHound - Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
NIST-to-Tech - An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
A-Red-Teamer-diaries - RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
BypassAV - This map lists the essential techniques to bypass anti-virus and EDR