A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
-
Updated
Jan 18, 2026
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Self-developed tools for Lateral Movement/Code Execution
Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the white paper Certified Pre-Owned.
This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.
This repository contains my preparation notes for CRTP and Red Teaming, focused on Active Directory attacks and defenses.
A modular Active Directory lab builder for hands-on penetration testing and security research in isolated environments.
Notes in preparation for the PNPT (Practical Network Penetration Testing) Certification Exam
AdStrike:AI Powered modular Active Directory red-team framework for authorized penetration testing, AD enumeration, attack-path analysis, Kerberos/ADCS workflows, reporting, and operator automation.
TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locking out accounts.
Cheatsheet from the PJPT course of TCM security.
Crackmapexec custom scripts used in my internal pentests.
GPP CPassword Decryption Tools
Repo with Tools and Wiki for Active Directory Pentesting
Active Directory Privileges
A user-friendly and powerful tool to analyze Windows Security Events
Hash Identifier in PowerShell
Argus-AD is a comprehensive Active Directory security assessment tool designed for SYSADMINs and IT Admins to identify misconfigurations, privilege escalation paths, lateral movement opportunities, and hybrid identity issues in their Active Directory environments.
my notes & methodology used
Add a description, image, and links to the active-directory-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the active-directory-exploitation topic, visit your repo's landing page and select "manage topics."