arsenal
ActiveDirectoryAttackTool
Our great sponsors
arsenal | ActiveDirectoryAttackTool | |
---|---|---|
9 | 2 | |
2,982 | 90 | |
1.9% | - | |
7.4 | 0.0 | |
16 days ago | about 1 year ago | |
Python | Shell | |
GNU General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
arsenal
- HackersToolKit.co - One-Stop Shop for Tool Commands for CTFs, bug bounty, and Penetration Testing
- The road to round 2 (so far)
-
Where can I find the best AD notes / cheatsheet for every situation :) ?
That AD Enum mindmap is here. I haven't tried adPEAS yet. But this was recommended many many times. Check. (:
- Orange-Cyberdefense/arsenal: inventory and launcher for hacking programs
- Arsenal
- GitHub - Orange-Cyberdefense/arsenal: Arsenal is just a quick inventory and launcher for hacking programs
-
Reconmap 1.5.0 release notes
900s new commands were imported from the awesome https://github.com/Orange-Cyberdefense/arsenal project into Reconmap. This pushed us to add pagination, better search, sorting and so on to the command pages as it was otherwise impossible to find the right security command amongst the long list.
-
Just failed the new format. General thoughts.
I'm really interested in feedback of those that tried "everything" to laterally move in the domain sets but failed. Have you tried everything from this mindmap for example? Much of that is out of scope on OSCP but will help you learn more about the mindset of moving in a domain.
- Pentesting AD Mindmap
ActiveDirectoryAttackTool
-
A tool to help with Active Directory and Windows
ADAT: https://github.com/The-Viper-One/ActiveDirectoryAttackTool
- Where can I find the best AD notes / cheatsheet for every situation :) ?
What are some alternatives?
reconmap - Vulnerability assessment and penetration testing automation and reporting platform for teams.
adPEAS - Powershell tool to automate Active Directory enumeration.
linux-smart-enumeration - Linux enumeration tool for pentesting and CTFs with verbosity levels
RedTeaming_CheatSheet - Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.
packages
t14m4t - Automated brute-forcing attack tool.
kashz-jewels - Gitbook: kashz-Jewels
Garud - An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically.
webrecon - Automated Web Recon Shell Scripts
AppleGamer22 - My write-ups (with references/bibliography to 3rd parties)