Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments. Untitled Goose Tool gathers additional...
active
adds
against
and
authentication
azure
azure,
azuread
customer’s
data
directory
environments
flexible
full
gathering
goose
hunt
incident
investigation
m365
methods
novel
order
response
robust
run
that
tool
untitled
Codef0rces 2.0’s directory - LeetC0de
> Microsoft
> A Way to Practice Competitive Programming
> Adobe
> Amazon
> Apple
> Array
> C++
> DS & Algo
> Expedia
> Facebook
> Math
> Oracle
> Twitter
> Visa
> VMware
> Walmart*
Hidden...
Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)
Looks for enabled normal user accounts. No Windows audit logs were generated. High-speed ~ up to 10K/sec – go beyond 25K/sec with multiple servers!
Tries to autodetect DC from...
LDAP Nom Nom
Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)
Looks for enabled normal user accounts. No Windows audit logs were generated. High-speed ~ up to 10K/sec – go beyond 25K/sec with multiple servers!
Tries to...
Description
As a security professional, one of your most important jobs is to make sure that only authorized users have access to your system. Most often, this is achieved via credential-based access control, where credentials are stored in central directories like Microsoft Active Directory...
Link Directory Pro is an advanced and modern-looking directory script with rich SEO features where you can create your own Link Directory in minutes.
https://codecanyon.net/item/link-directory-pro/34390503
Hidden content
Active Directory Pentesting With Kali Linux – Red Team
Attacking and Hacking Active Directory With Kali Linux Full Course – Red Team Hacking Pentesting
What you’ll learn
How to Use Metasploit to Exploit Active Directory
How to Use Empire to Exploit Active Directory
How to Use...
BloodyAD is an Active Directory Privilege Escalation Framework.
This tool can perform specific LDAP/SAMR calls to a domain controller in order to perform AD privesc. It supports authentication using passwords, NTLM hashes, or Kerberos.
How it works
bloodyAD communicates with a DC using mainly...
SharpSpray
SharpSpray is a Windows domain password spraying tool written in .NET C#.
SharpSpray is a C# port of DomainPasswordSpray with enhanced and extra capabilities. This tool uses LDAP Protocol to communicate with the Domain active directory services.
Features
Can operate from...
Description
ـــــــــــــــــــــــــ
Most enterprise networks today are managed using Windows Active Directory and it is imperative for a security professional to understand the threats to the Windows infrastructure.
Active Directory Pretesting is designed to provide security professionals to...
This addon provides facebook live chat facility to Atlas Directory Listing business owners with their customers. Using this addon, business owners can give live chat option to their site visitors and potential customers. This increase sales of your products and services directly...
OpenDoor OWASP is a console multifunctional websites scanner. This application finds all possible ways to login, index of/ directories, web shells, restricted access points, subdomains, hidden data, and large backups. The scanning is performed by the built-in dictionary and external dictionaries...
BloodHound is a single page Javascript web application, built on top of Linkurious, compiled with Electron, with a Neo4jdatabase fed by a PowerShell ingestor.
BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers...
Web 2.0 Directory plugin provides an ability to build any kind of business directory site: classifieds, events directory, cars, bikes, boats and other vehicles dealers site, pets, real estate portal, wedding site, yellow pages. In other words – whatever you want...
Links Directory is an application that provides your community with a member driven web directory. Allow members to submit websites for approval in categories you define. Users can comment and rate on other member’s submissions. You can also mark websites as official affiliates, fostering...
AD Penetration Testing Lab
The AD Pentesting tool (ADLab) is a tool created in PowerShell to quickly set up an Active directory lab for testing purposes. This tool can help set up a Domain controller and Workstation in a lab environment quickly and effectively. While the tool is specifically...
An Burpsuite extension to bypass the 403 restricted directories. By using PassiveScan (default enabled), each 403 requests will be automatically scanned by this extension, so just add to burpsuite and enjoy.
Payloads: $1: HOSTNAME $2: PATH
Powerful web directory fuzzer to locate existing and/or hidden files or directories.
Similar to dirb or gobuster, but with a lot of mutation options.
Features
Proxy support
Cookie support
Basic Auth
Digest Auth
Retries (for slow servers)
Persistent and non-persistent...
ADCollector is a lightweight tool that enumerates the Active Directory environment to identify possible attack vectors. It will give you a basic understanding of the configuration/deployment of the environment as a starting point.
Notes:
ADCollector is not an alternative to the powerful...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.