AD-Attack-Defense

AD defense guide

An interactive guide to understanding and defending against attacks on Active Directory networks.

Attack and defend active directory using modern post exploitation adversary tradecraft activity

GitHub

4k stars
222 watching
1k forks
last commit: 15 days ago

Related projects:

Repository Description Stars
s1ckb0y1337/active-directory-exploitation-cheat-sheet A comprehensive resource for exploiting and enumerating vulnerabilities in Windows Active Directory networks. 5,669
integration-it/active-directory-exploitation-cheat-sheet A comprehensive guide to exploiting and enumerating Windows Active Directory environments through PowerShell 2,483
byt3bl33d3r/deathstar Automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using offensive TTPs 1,585
cloud-architekt/azuread-attack-defense A collection of attack scenarios and mitigation strategies for Microsoft Entra ID 2,149
orange-cyberdefense/goad An Active Directory pentest lab project providing a vulnerable environment for security testing and practice. 5,416
ly4k/certipy A tool for enumerating and abusing Active Directory Certificate Services 2,418
ad-attacks/active-directory-penetration-testing A comprehensive resource for learning and practicing penetration testing on Active Directory infrastructures 16
deanofcyber/active-directory-penetration-testing-and-security A collection of resources and documentation for testing and securing Active Directory environments 30
infosec-au/altdns Automates subdomain discovery through permutations and alterations of known domain patterns and words. 2,333
fuzzdb-project/fuzzdb A comprehensive toolset for identifying and exploiting application vulnerabilities through dynamic testing 8,242
netspi/powerupsql A PowerShell toolkit for discovering and interacting with Microsoft SQL Server systems 2,469
evyatarmeged/raccoon A high-performance tool for reconnaissance and vulnerability scanning of web applications and networks 3,091
bloodhoundad/bloodhound A tool that uses graph theory to reveal relationships and attack paths in Active Directory environments 9,893
sbousseaden/evtx-attack-samples A repository of Windows Event log samples associated with various attack and post-exploitation techniques. 2,248
opennhp/opennhp A Zero Trust networking protocol to hide servers and data from attackers by utilizing cryptography at the OSI 5th layer. 13,513