94 private links
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection) - lkarlslund/Adalanche
Tool for Active Directory Certificate Services enumeration and abuse - ly4k/Certipy
Active Directory certificate abuse. Contribute to GhostPack/Certify development by creating an account on GitHub.
Active Directory Explorer ist ein erweiterter Active Directory(AD)-Viewer und -Editor.
KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync). - GitHub - helviojunior/knowsmore: KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).
GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application. - GitHub - GoFetchAD/GoFetch: GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.
Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…
This project is aimed at providing technical guides on various hacking topics. The most advanced topics are Active Directory and Web services. Other topics will be added. The ultimate goal is centralize all hacking techniques
This is a GitBook of mine whose purpose is keeping my pentest notes on hand. It's far from being perfect in terms of organization (that's why I call it "promiscuous") and, basically, I'm logging it for myself, but it turned out that hosting it online makes it most convenient to access. So, if you find it handy too, feel free to use it... responsibly, of course!
The Network Execution Tool. Contribute to Pennyw0rth/NetExec development by creating an account on GitHub.
Learn to use NetExec
Is that printer in your office vulnerable to a pass-back attack? Why Multi-Function Peripheral (MFP) Hacking an important tool in the pen tester's arsenal.
BloodHound data collection, aka Sharphound, is quite a complex beast.
When giving BloodHound workshops, the part where I get the most questions is always data collection.
How is the BloodHound data collected? What methods do what? Who am I talking to? How do I fly under the radar?
This time a video, I haven't watched it completly until now, but I scrolled through the slide deck and think it is worth watching.