Lists (2)
Sort Name ascending (A-Z)
Stars
Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound
Curated collection of CVE Proof of Concepts — reproducible and categorized for security researchers.
WebGoat is a deliberately insecure application
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Kerberos relaying and unconstrained delegation abuse toolkit
Yelix is a powerful web server framework built specifically for Deno, leveraging the Hono in the background. It simplifies backend development with automated features, including built-in data valid…
Vulnerable environments paired with ready-to-use Nuclei templates for security testing and learning! 🚀
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
BloodyAD is an Active Directory Privilege Escalation Framework
best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect
Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
Accept URLs on stdin, replace all query string values with a user-supplied value
Powershell tool to automate Active Directory enumeration.
Custom Query list for the Bloodhound GUI based off my cheatsheet
GitHub interface supporter for lazy developers. Imagine a GitHub homepage that feels like yours – tailored to your needs, keeping your focus where it belongs, and respecting your privacy every step…
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Python3 script to quickly get various information from a domain controller through his LDAP service.
Kali Linux Fixes for Newly Imported VM's
🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.
Arsenal is just a quick inventory and launcher for hacking programs
Automation for internal Windows Penetrationtest / AD-Security
ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.
proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" fo…
Just another Powerview alternative but on steroids
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.