Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/AD-Attacks/Active-Directory-Penetration-Testing
https://github.com/AD-Attacks/Active-Directory-Penetration-Testing
Last synced: 3 days ago
JSON representation
- Host: GitHub
- URL: https://github.com/AD-Attacks/Active-Directory-Penetration-Testing
- Owner: AD-Attacks
- License: apache-2.0
- Created: 2023-10-03T22:40:13.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-04-23T21:26:28.000Z (7 months ago)
- Last Synced: 2024-08-02T16:31:58.348Z (3 months ago)
- Size: 17.9 MB
- Stars: 10
- Watchers: 0
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
- awesome-pentest-cheat-sheets - Resource Collection #2 - Collection of Active Directory Pentesting resources #2 (☁️ Cloud Pentesting / Active Directory)
README
---
description: >-
Introduction to Active Directory Penetration Testing by RFS. Learn how to
conquer Enterprise Domains.
cover: .gitbook/assets/Active-Directory-Attacks.png
coverY: -91.53292361720807
layout:
cover:
visible: true
size: full
title:
visible: true
description:
visible: true
tableOfContents:
visible: true
outline:
visible: true
pagination:
visible: true
---# ☠ Introduction
Welcome to my corner of Active Directory Hacking, my name is RFS and here I keep notes about Penetration testing and Red Teaming on Windows Infrastructures.
Active Directory Penetration Testing
### Do you Want More?
Join the Discord Community
{% embed url="https://discord.gg/kWD6mxeBbK" %}
I Have a lot more, I have juice everywhere - trust me you will love it!
{% embed url="https://cli-ck.me/htb-pro-labs" %}
{% @mailchimp/mailchimpSubscribe %}
{% embed url="https://ad-attacks.com/" %}
[https://discord.gg/REhVRQGPGf](https://discord.gg/REhVRQGPGf)
### More Penetration Testing Resources
* [Active Directory Penetration Testing](https://github.com/PopLabSec/Active-Directory-Penetration-Testing)
* [Infrastructure Penetration Testing](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main)
* [Networks Penetration Testing](https://github.com/PopLabSec/Networking-Penetration-Testing)
* [Web Applications Penetration Testing](https://github.com/PopLabSec/Web-Applications-Penetration-Testing)
* [Wireless Security](https://www.offensive-wireless.com/)
* [Ethical Hacking](https://github.com/PopLabSec/RFS-Ethical-Hacking)### Active Directory Attacks by Service Type (Protocol)
* [NetBIOS](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main/NetBIOS)
* [DNS](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main/DNS/index.md)
* [MsSQL](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main/MSSQL/index.md)
* [LDAP](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main/LDAP/index.md)
* [Kerberos](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main/Kerberos/index.md)
* [Samba](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main/Samba/index.md)
* [IIS](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main/IIS/index.md)
* [Exchange](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main/Exchange/index.md)
* [WinRM](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main/WinRM/index.md)
* [SCCM](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main/SCCM/index.md)### My Tools Arsenal Documentation
* [Nmap](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main)
* [CrackMapExec](https://crackmapexec.popdocs.net/)
* [Rubeus](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main)
* [Certify](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main)
* [Mimikatz](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main)
* [BloodHound](https://bloodhound.popdocs.net/)
* [DeathStar](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main)
* [Metasploit](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main)
* [Empire](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main)
* [Covenant](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main)
* [Cobalt Strike](https://github.com/PopLabSec/Active-Directory-Penetration-Testing/blob/main)### Network Protocols Attack Guides
ProtocolPortArticleFTPFTP Penetration TestingRDPRDP Penetration TestingSMBSMB Penetration TestingPostGresSQLPostgreSQL Penetration TestingSSHSSH Penetration TestingNetBiosNetBios Penetration TestingSMTPSNMPLDAPPOPIMAPKerberosTFTP
{% embed url="https://affiliate.hackthebox.com/pro-labs" %}