AD-Attack-Defense

AD defense guide

An interactive guide to understanding and defending against attacks on Active Directory networks.

Attack and defend active directory using modern post exploitation adversary tradecraft activity

GitHub

4k stars
222 watching
1k forks
last commit: 3 months ago

Related projects:

Repository Description Stars
s1ckb0y1337/active-directory-exploitation-cheat-sheet A comprehensive resource for exploiting and enumerating vulnerabilities in Windows Active Directory networks. 5,745
integration-it/active-directory-exploitation-cheat-sheet A collection of PowerShell scripts and methods for exploiting Windows Active Directory vulnerabilities 2,499
byt3bl33d3r/deathstar Automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using offensive TTPs 1,592
cloud-architekt/azuread-attack-defense A collection of attack scenarios and mitigation strategies for Microsoft Entra ID 2,183
orange-cyberdefense/goad A pentest active directory LAB project providing a vulnerable environment for practice. 5,620
ly4k/certipy A tool for enumerating and abusing Active Directory Certificate Services 2,474
ad-attacks/active-directory-penetration-testing A comprehensive resource for learning and practicing penetration testing on Active Directory infrastructures 16
deanofcyber/active-directory-penetration-testing-and-security A collection of resources and documentation for testing and securing Active Directory environments 30
infosec-au/altdns Automates subdomain discovery through permutations and alterations of known domain patterns and words. 2,344
fuzzdb-project/fuzzdb A comprehensive toolset for identifying and exploiting application vulnerabilities through dynamic testing 8,288
netspi/powerupsql A PowerShell toolkit for discovering and interacting with Microsoft SQL Server systems 2,490
evyatarmeged/raccoon A high-performance tool for reconnaissance and vulnerability scanning of web applications and networks 3,105
sbousseaden/evtx-attack-samples A repository of Windows Event log samples associated with various attack and post-exploitation techniques. 2,265
opennhp/opennhp A Zero Trust protocol that leverages resource-hiding and encryption to safeguard servers and data from attackers 13,520