AD-Attack-Defense
AD defense guide
An interactive guide to understanding and defending against attacks on Active Directory networks.
Attack and defend active directory using modern post exploitation adversary tradecraft activity
4k stars
222 watching
1k forks
last commit: 15 days ago Related projects:
Repository | Description | Stars |
---|---|---|
s1ckb0y1337/active-directory-exploitation-cheat-sheet | A comprehensive resource for exploiting and enumerating vulnerabilities in Windows Active Directory networks. | 5,669 |
integration-it/active-directory-exploitation-cheat-sheet | A comprehensive guide to exploiting and enumerating Windows Active Directory environments through PowerShell | 2,483 |
byt3bl33d3r/deathstar | Automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using offensive TTPs | 1,585 |
cloud-architekt/azuread-attack-defense | A collection of attack scenarios and mitigation strategies for Microsoft Entra ID | 2,149 |
orange-cyberdefense/goad | An Active Directory pentest lab project providing a vulnerable environment for security testing and practice. | 5,416 |
ly4k/certipy | A tool for enumerating and abusing Active Directory Certificate Services | 2,418 |
ad-attacks/active-directory-penetration-testing | A comprehensive resource for learning and practicing penetration testing on Active Directory infrastructures | 16 |
deanofcyber/active-directory-penetration-testing-and-security | A collection of resources and documentation for testing and securing Active Directory environments | 30 |
infosec-au/altdns | Automates subdomain discovery through permutations and alterations of known domain patterns and words. | 2,333 |
fuzzdb-project/fuzzdb | A comprehensive toolset for identifying and exploiting application vulnerabilities through dynamic testing | 8,242 |
netspi/powerupsql | A PowerShell toolkit for discovering and interacting with Microsoft SQL Server systems | 2,469 |
evyatarmeged/raccoon | A high-performance tool for reconnaissance and vulnerability scanning of web applications and networks | 3,091 |
bloodhoundad/bloodhound | A tool that uses graph theory to reveal relationships and attack paths in Active Directory environments | 9,893 |
sbousseaden/evtx-attack-samples | A repository of Windows Event log samples associated with various attack and post-exploitation techniques. | 2,248 |
opennhp/opennhp | A Zero Trust networking protocol to hide servers and data from attackers by utilizing cryptography at the OSI 5th layer. | 13,513 |