Skip to content
View cyberust's full-sized avatar
💭
I may be slow to respond.
💭
I may be slow to respond.

Block or report cyberust

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

AD

33 repositories

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

PowerShell 2,648 518 Updated Jul 6, 2025

An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.

CSS 5,846 1,217 Updated Oct 20, 2025
PowerShell 109 17 Updated Feb 13, 2024

A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.

C 585 67 Updated Jan 2, 2025

Attack and defend active directory using modern post exploitation adversary tradecraft activity

4,736 1,086 Updated Jul 29, 2025

Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.

C 561 101 Updated Aug 12, 2025

A GUI wrapper inside of Havoc to interact with bloodhound CE

Python 71 13 Updated Feb 3, 2024

Windows Local Privilege Escalation Cookbook

PowerShell 1,207 189 Updated Jan 20, 2025

Patching "signtool.exe" to accept expired certificates for code-signing.

C++ 295 51 Updated Jul 19, 2024

A CIA tradecraft technique to asynchronously detect when a process is created using WMI.

C++ 136 29 Updated Dec 29, 2023

CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator.

C 182 31 Updated Jan 3, 2024

Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifyin…

1,077 106 Updated Jun 30, 2025

OSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines

1,046 230 Updated Oct 27, 2024

Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege

C 223 34 Updated Nov 23, 2023

Automation to assess the state of your M365 tenant against CISA's baselines

PowerShell 2,339 328 Updated Nov 5, 2025

Azure Data Exporter for BloodHound

Go 816 116 Updated Oct 23, 2025

Cloud-native SIEM for intelligent security analytics for your entire enterprise.

Python 5,334 3,407 Updated Nov 5, 2025

Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments

PowerShell 433 67 Updated Oct 1, 2025

Azure DevOps Services Attack Toolkit

C# 300 34 Updated Mar 15, 2025

The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory Canary objects.

PowerShell 256 12 Updated Nov 24, 2023

game of active directory

PowerShell 7,071 982 Updated Jul 16, 2025

Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)

460 83 Updated Nov 19, 2024

Six Degrees of Domain Admin

PowerShell 10,399 1,784 Updated Aug 1, 2025

This repo is about Active Directory Advanced Threat Hunting

PowerShell 629 86 Updated Feb 17, 2025

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

6,362 1,309 Updated Mar 21, 2025

List of Awesome Advanced Windows Exploitation References

1,521 344 Updated Jan 13, 2022

One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️

Python 6,286 746 Updated Aug 4, 2025

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 71,414 16,179 Updated Nov 2, 2025