Ashifcoder / exposelabLinks
This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.
☆101Updated 5 months ago
Alternatives and similar repositories for exposelab
Users that are interested in exposelab are comparing it to the libraries listed below
Sorting:
- C2 Automation using Linode☆85Updated 3 years ago
- My Favorite Offensive Security Scripts☆82Updated 8 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆106Updated 2 years ago
- https://lolad-project.github.io/☆84Updated last year
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- Tool for enumerating Active Directory environments☆48Updated 2 years ago
- a map for the azure oriented pentests☆70Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- Automated Active Directory lab running on Proxmox☆88Updated 5 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- ☆104Updated 3 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆139Updated 2 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- ☆39Updated 4 years ago
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 5 months ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆79Updated 4 months ago
- ☆52Updated last year
- ☆104Updated 11 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144Updated last year
- ☆85Updated 3 years ago
- ☆95Updated last year
- ☆37Updated 4 years ago
- A collection of tools that I use in CTF's or for assessments☆106Updated 11 months ago
- ☆62Updated last month
- ☆101Updated 4 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆37Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆64Updated last week
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago