Skip to content
View MJVL's full-sized avatar

Organizations

@codeRIT @TheMasonACM @ritsec @ThirtyEightySeven

Block or report MJVL

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

AD

23 repositories

Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.

C# 939 121 Updated Nov 11, 2024

ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-object dumping to NDJSON.

Python 1,073 147 Updated Mar 20, 2026

BloodyAD is an Active Directory Privilege Escalation Framework

Python 2,154 203 Updated Apr 10, 2026

Trying to tame the three-headed dog.

C# 4,971 888 Updated Nov 14, 2025

Custom Query list for the Bloodhound GUI based off my cheatsheet

848 132 Updated Oct 29, 2025

Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.

C# 895 75 Updated Apr 8, 2025

Automation for internal Windows Penetrationtest / AD-Security

PowerShell 3,653 541 Updated Aug 28, 2025

Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel

C# 738 89 Updated Sep 3, 2025

Active Directory certificate abuse.

C# 1,957 270 Updated Mar 30, 2026

Tool for Active Directory Certificate Services enumeration and abuse

Python 3,469 459 Updated Feb 28, 2026

Powershell tool to automate Active Directory enumeration.

PowerShell 1,296 151 Updated Apr 16, 2026

Check for LDAP protections regarding the relay of NTLM authentication

Python 531 82 Updated Nov 19, 2024

FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE accesses.

Python 431 50 Updated Nov 12, 2025

SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by…

C# 1,321 156 Updated Dec 15, 2020

Partial python implementation of SharpGPOAbuse

Python 544 63 Updated Mar 30, 2026

SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.

Python 909 119 Updated Apr 9, 2026

Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?

Go 2,153 205 Updated Apr 12, 2026

Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)

Go 1,111 91 Updated Nov 9, 2024

DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.

Python 136 14 Updated Apr 12, 2024

PingCastle - Get Active Directory Security at 80% in 20% of the time

C# 2,826 342 Updated Apr 14, 2026

Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).

C# 590 61 Updated Mar 19, 2024

A collection of scripts for assessing Microsoft Azure security

PowerShell 2,358 336 Updated Mar 15, 2026

Azure Post Exploitation Framework

PowerShell 245 22 Updated Oct 27, 2025