☆50Jan 30, 2026Updated last month
Alternatives and similar repositories for DO-LAB
Users that are interested in DO-LAB are comparing it to the libraries listed below
Sorting:
- Defensive Origins Training Schedule☆39Dec 11, 2023Updated 2 years ago
- Atomic Purple Team Framework and Lifecycle☆299Feb 11, 2021Updated 5 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- A simple Python script to do quick, targeted recon of a given domain.☆70Apr 17, 2025Updated 11 months ago
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆24Feb 2, 2026Updated last month
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Jan 22, 2021Updated 5 years ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆488Nov 21, 2024Updated last year
- Purple Teaming Attack & Hunt Lab - Terraform☆163Nov 29, 2021Updated 4 years ago
- Wireless Pentesting Device☆24Aug 14, 2020Updated 5 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Monitor/Archive of Azure IAM (Role Definitions and Provider Operations). Tweets at https://twitter.com/maiam_bot☆10Updated this week
- Location of some Active Directory lab scripts I have created and find useful☆113Feb 2, 2026Updated last month
- Intro Labs Remastered☆35Mar 7, 2025Updated last year
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆44Mar 19, 2024Updated 2 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆219Jan 18, 2023Updated 3 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- For Interview, OSCP proof of concept code during the course.☆16Jul 26, 2019Updated 6 years ago
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆47Sep 18, 2025Updated 6 months ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- ☆11Apr 22, 2022Updated 3 years ago
- Build K3s image using Packer☆13Mar 10, 2026Updated last week
- Tools for simulating threats☆202Oct 27, 2023Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Your Browser-based EVTX Companion☆114Mar 2, 2026Updated 2 weeks ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated last month
- Python utility to generate filesystem content for Obsidian.☆87Aug 11, 2023Updated 2 years ago
- ☆22Aug 29, 2023Updated 2 years ago
- Profile info☆14Mar 12, 2024Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated last year
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago