AD
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.
Attack and defend active directory using modern post exploitation adversary tradecraft activity
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
A GUI wrapper inside of Havoc to interact with bloodhound CE
Windows Local Privilege Escalation Cookbook
Patching "signtool.exe" to accept expired certificates for code-signing.
A CIA tradecraft technique to asynchronously detect when a process is created using WMI.
CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator.
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifyin…
OSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines
Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege
Automation to assess the state of your M365 tenant against CISA's baselines
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory Canary objects.
Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)
Six Degrees of Domain Admin
This repo is about Active Directory Advanced Threat Hunting
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
List of Awesome Advanced Windows Exploitation References
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
A list of useful payloads and bypass for Web Application Security and Pentest/CTF