Active-Directory-Penetration-Testing-and-Security
AD Security Resources
A collection of resources and documentation for testing and securing Active Directory environments
Resources for AD penetration testing and security
30 stars
3 watching
12 forks
last commit: over 3 years ago
Linked from 1 awesome list
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A comprehensive resource for learning and practicing penetration testing on Active Directory infrastructures | 16 |
| | A tool designed to test and demonstrate various active directory attacks in a controlled environment. | 2,022 |
| | An open-source pentesting project focused on Active Directory exploits and techniques | 156 |
| | A curated collection of exploit tools and frameworks used in penetration testing and security research. | 334 |
| | A tool to generate and simulate an Active Directory domain for training and testing purposes. | 2,064 |
| | Tools for gathering and reporting information about an Active Directory environment | 717 |
| | Automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using offensive TTPs | 1,592 |
| | Tools for interacting with and auditing directory services, including Active Directory and Azure Active Directory | 1,663 |
| | This project provides a collection of security vulnerabilities discovered in various IoT devices from brands such as Dlink and Tenda. | 22 |
| | An active Java deserialization vulnerability identifier and exploiter | 7 |
| | A collection of tools and resources for iOS penetration testing and reverse engineering | 1,047 |
| | A collection of compiled scripts and resources for testing and exploiting vulnerabilities in various systems and applications | 1,327 |
| | A curated collection of tools and resources for penetration testing and security assessment | 95 |
| | A collection of scripts and tools for testing and exploiting network and system vulnerabilities. | 1 |
| | A comprehensive web application penetration testing framework with modules for reconnaissance, enumeration, and vulnerability analysis. | 1,787 |