Antonlovesdnb / ConstructingDefenseLabLinks
Ludus range for the Constructing Defense Lab
☆39Updated last month
Alternatives and similar repositories for ConstructingDefenseLab
Users that are interested in ConstructingDefenseLab are comparing it to the libraries listed below
Sorting:
- An Ansible collection that installs an ADFS deployment with optional configurations.☆42Updated 10 months ago
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆89Updated 2 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆90Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆61Updated 7 months ago
- ☆34Updated 3 months ago
- ☆46Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆77Updated 9 months ago
- ☆116Updated last month
- ☆24Updated 8 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated last week
- BloodHound PowerShell client☆67Updated 3 weeks ago
- POC tool to abuse windows server failover clusters☆45Updated 2 months ago
- Payload Generation Workflow☆40Updated 3 months ago
- ☆71Updated 2 months ago
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆42Updated 7 months ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆47Updated last year
- An Ansible collection that installs an SCCM deployment with optional configurations.☆92Updated 3 months ago
- ☆122Updated 3 months ago
- Baseline a Windows System against LOLBAS☆68Updated last year
- Persist like a Dodder☆65Updated 5 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆112Updated 2 months ago
- Living off the land searches for explorer and sharepoint☆90Updated 5 months ago
- ☆54Updated 4 months ago
- ☆27Updated last month
- An offensive toolkit for restless guests #DEFCON33☆52Updated 2 months ago
- AAD related enumeration in Nim☆131Updated 2 years ago
- My Notes from Hugging Face AI Agents Course☆19Updated 8 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆88Updated 3 months ago
- ☆162Updated 8 months ago